Description
Need help with some information security questions. Please find attached. Thank you
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
Good luck in your study and if you need any further help in your
assignments, please let me know
Can you please confirm if you have received the work? Once
again, thanks for allowing me to help you
R STUDYPOOL NO OUTLINE IS NEEDED HERE
Running Head: INFORMATION SYSTEM SECURITY
Information System Security
Name
Class number
Assignment number
Instructor
Date
1
INFORMATION SYSTEM SECURITY
2
1. Cryptography is the practice of securing communications so that, in case they are
intercepted, the adversaries do not read the content of the messages. It uses mathematics
and science for data encryption and decryption. Cryptography allows for private
communications by safeguarding the integrity of the information in transit. Currently,
cryptography's use in IT lies in confirmation and non-repudiation. Information such login
information in computers is encrypted so that, any unintended party who comes across
the information would not decipher it without a key. It makes it possible for two or more
parties to communicate over public networks without the risk of compromise. In
layman’s language, cryptography is a private communication, on an open platform.
Consider a locker in a public locker room. Cryptography is the specific key to that
particular locker, whereby access to the locker is only granted to those who have the
specific key to that locker.
2. Pretty Good Encryption (PGP) is a program for encryption that uses both a public and
a private key for encryption and decryption respectively. With a public key, it solves the
dilemma of key distribution. It is a 1991 creation by Phil Zimmerman. It is well-known
for its simplicity and use, as well as effective...