Questions in Information technology and security

timer Asked: Oct 10th, 2016
account_balance_wallet $9.99

Question Description

Need help with some information security questions. Please find attached. Thank you

Unformatted Attachment Preview

Information system security 1. Describe cryptography in layman's terms. 2. What is PGP and how difficult is it to install/use? 3. What is the future of PKI? Acceptance of PKI solutions—and product sales—has fallen short of early estimates. What would the “killer app” for PKI sales look like? 4. Will biometrics involve encryption? How are biometric technologies dependent on the use of cryptography? ...
Purchase answer to see full attachment

Tutor Answer

School: New York University

Good luck in your study and if you need any further help in your
assignments, please let me know 

Can you please confirm if you have received the work? Once
again, thanks for allowing me to help you



Information System Security
Class number
Assignment number




1. Cryptography is the practice of securing communications so that, in case they are
intercepted, the adversaries do not read the content of the messages. It uses mathematics
and science for data encryption and decryption. Cryptography allows for private
communications by safeguarding the integrity of the information in transit. Currently,
cryptography's use in IT lies in confirmation and non-repudiation. Information such login
information in computers is encrypted so that, any unintended party who comes across
the information would not decipher it without a key. It makes it possible for two or more
parties to communicate over public networks without the risk of compromise. In
layman’s language, cryptography is a private communication, on an open platform.
Consider a locker in a public locker room. Cryptography is the specific key to that
particular locker, whereby access to the locker is only granted to those who have the
specific key to that locker.
2. Pretty Good Encryption (PGP) is a program for encryption that uses both a public and
a private key for encryption and decryption respectively. With a public key, it solves the
dilemma of key distribution. It is a 1991 creation by Phil Zimmerman. It is well-known
for its simplicity and use, as well as effective...

flag Report DMCA

Excellent job

Similar Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors