Podcast
Questions and Answers
Asymmetric encryption, or public-key encryption, encodes messages by using two mathematically related numeric keys: a ______ key and a private key.
Asymmetric encryption, or public-key encryption, encodes messages by using two mathematically related numeric keys: a ______ key and a private key.
public
Symmetric encryption, or private-key encryption, the message is encrypted and decrypted by using the same ______.
Symmetric encryption, or private-key encryption, the message is encrypted and decrypted by using the same ______.
key
MD5 accepts as input a string (series of characters) of any length and produces a 128-bit fixed-length digest ______.
MD5 accepts as input a string (series of characters) of any length and produces a 128-bit fixed-length digest ______.
value
The SSL encrypts and decrypts information flowing between the two ______.
The SSL encrypts and decrypts information flowing between the two ______.
Signup and view all the answers
Data warehouses are designed to facilitate reporting and analysis, and provide decision support solutions that run faster and are more ______.
Data warehouses are designed to facilitate reporting and analysis, and provide decision support solutions that run faster and are more ______.
Signup and view all the answers
Encryption is the coding of information by a mathematically based program and a ______ key to produce a string of characters that is unintelligible.
Encryption is the coding of information by a mathematically based program and a ______ key to produce a string of characters that is unintelligible.
Signup and view all the answers
E-business Security refers to the principles which guide safe electronic transactions, allowing the buying and selling of goods and services through the internet, but with protocols in place to provide ______ for those involved.
E-business Security refers to the principles which guide safe electronic transactions, allowing the buying and selling of goods and services through the internet, but with protocols in place to provide ______ for those involved.
Signup and view all the answers
Confidentiality: Most of the information is not confidential. However, the credit card number certainly is. All of the information is confidential and must be protected in ______.
Confidentiality: Most of the information is not confidential. However, the credit card number certainly is. All of the information is confidential and must be protected in ______.
Signup and view all the answers
The customer will want to have integrity in the order so that he gets what he wants. Need to guarantee the integrity of the catalog so that the price in the catalog is the price that is paid for the ______.
The customer will want to have integrity in the order so that he gets what he wants. Need to guarantee the integrity of the catalog so that the price in the catalog is the price that is paid for the ______.
Signup and view all the answers
The organization will need to make sure that the person using the credit card is the owner of the card. The organization will need to have some form of identification and authentication so that only subscribers can view the ______.
The organization will need to make sure that the person using the credit card is the owner of the card. The organization will need to have some form of identification and authentication so that only subscribers can view the ______.
Signup and view all the answers