Consider The Scenario In Which A Server Session Has Been Intercepted By A Man In Themiddle Attack Even Though You Assum 1 (44.64 KiB) Viewed 46 times
Consider The Scenario In Which A Server Session Has Been Intercepted By A Man In Themiddle Attack Even Though You Assum 2 (8.31 KiB) Viewed 46 times
Consider the scenario in which a server session has been intercepted by a man-in-themiddle attack. Even though you assume you are exchanging a key (K) with the server, it's possible that you're actually sharing it with an attacker. The server, on the other hand, is in possession of both a public key, KP, and a private secret key, KS. Describe how you can either confirm that you share K with the server or disprove that you do not? (10 markah/marks) Cloud computing is becoming more popular among individuals and businesses for a variety of reasons, including cost savings, increased productivity, increased speed, efficiency, performance, and security. Identify Two(2) potential issues of cloud computing on data security that you believe will occur. (8 markah/marks) A bank wishes to record the account number of its clients (an 8 -digit number) on magnetic stripe ATM cards in an encrypted format for the purpose of fraud prevention. Analyze on how secure the following methods of storing the account number are in the face of an adversary who is capable of reading the magnetic stripe: Encrypt the account number and store it as a cryptographic hash; (4 markah/marks) Use a public-key cryptosystem to save the ciphertext of the account number once it has been encrypted with the bank's public key.
Use a symmetric cryptosystem to save the ciphertext of the account number once it has been encrypted with the bank's secret key.
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!