Encrypt Messages The Published Private Keys example essay topic

581 words
Explain the difference between: a. Historical Logging: will show the history of who has logged onto a particular system or site. Statistical Logging: will give you certain information that is more detail oriented containing information about who or how many hits a system or file has received. b. File Security: There are many things that can be done to ensure integrity of files. First, there should only be a select few employees that can change files, read and write to them. Other employees should have lower level access to files - like read only.

Firewalls: A firewall puts up a barrier that controls the flow of traffic between networks. This usually occurs between a corporate network and the Internet, but also between divisional networks or inner company networks. The common practice is to focus on outside threats to a system, but there have been many studies that have shown unauthorized activities from employees on the inside of a network. c. Secret Keys: To encrypt messages, the published public keys of the recipient are used. To decrypt the messages, the recipient uses their unpublished Secret keys known only to them. Public Keys: The published part of a two-part, public key cryptography system.

Only the owner knows the private part. d. Symmetric Keys: same as secret key cryptography Asymmetric Keys: This is the same as public key cryptography. A cryptographic method that uses a two-part key (code), which is made up of public and private components. To encrypt messages the published private keys are used. To decrypt messages the recipient uses unpublished keys known only to them. e. Digital Certificate -A fancy term for buying goods and services on-line over the internet using your credit card, possibly in conjunction with some type of verification of who you are from an independent certifying authority.

Digital Postmark -When performing business via e-commerce, it is essential that you are able to irrefutably document when an event occurs. A "postmark" is a legally valid physical timestamp. A trusted third party such as a credit card processing company handles this type of business. What type of security is associated with each level of the Open Systems Interconnect (OSI) Model? OSI model Application - Layer 7 - Logon Presentation - Layer 6 - encryption Session - Layer 5 -Authorization Transport - Layer 4 - break and combine packets Network - Layer 3 - keys Data Link - Layer 2 - error checking Physical - Layer 1 - physical hardware keys Explain the difference between logical and physical design of a network. High-level versus low-level.

Logical implies a higher view than the physical. Users relate to data logically by data element names. The actual data fields are really in their physical properties located in sectors on a disk. For example, if you want to know which customers ordered a specific product - the logical view is customer name and quantity.

The physical organization may have the customer name in a customer file, and the quantity in an order file referenced by the customer name. The physical sequence of the customer file could be indexed. The order file could be sequential. A message transmitted from Los Angles to Boston logically goes between two cities; but, the physical circuit could be Los Angles to Phoenix to Chicago to Philadelphia to Boston.