Threat Statement
Define the term Threat Statement and what are their consequences?
Expert
Threat Statement:Threats here occur from several sources. There are different motivations for different sets of people and their actions will be accordingly. Now let us see them in detail. There are some hackers or crackers. They can hack your password of your mails, database, computer etc and leak all the information. This sometime result in the block of your mails or database and trouble you. But this becomes a minor problem because if they use your information it may harm your organization. There are computer criminals. Their main intention is get profited from your information. For this they may destroy the information so that you cannot utilize it or illegally disclose it to others or anything of this sort. The other set of people causing risk are terrorists. They just destroy the information or use that to harm you or blackmail you. You have to be very careful especially when you are facing this because their main intention is not the data but to make you suffer they use the data. The next sets of people are competent organizations. They try to get the information of your various activities so that they can copy you and make you down or use the information in various purposes. Here there are various ways of information leakage. This may happen by hacking of your account or through your employee who is bribed by them to get it. The final sets of people are insiders that is employees. Some of them don’t have enough knowledge but don’t ask others due to ego problem and may cause damage to the information. Some of them due to negligence, some due to dishonest. In some organizations the terminated employees still have permissions to access data. So they may misuse this for their present organization sake or for their revenge.
Explain middle portion of the 3DES a decryption rather than the encryption?
In the context of Kerberos, what is meant by the term realm?
Explain the term Mix Columns.
Explain the term key Identifier?
Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)
Advantages of ReefEdge technology: The advantages of using the ReefEdge technology by an organization are listed below: The system captures the identity of the user who is going to use the system. Therefore the acc
Explain what is meant by Sub Bytes.
What are the methods used by a station to sense whether a station is idle or busy? Explain with a neat diagram.
ACL (Access control list): In order to control the access to a particular number of users the wireless network makes use of ACL which is access control list. In this the unique address of the clients or the users are used and hence a check can be put
Explain the two problems which are there along with the one-time pad?
18,76,764
1952410 Asked
3,689
Active Tutors
1430335
Questions Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!