Describe briefly the software package called pgp

Describe briefly the software package called pgp/Management Information Sys

1. a. State four reasons why physical security is needed.

b. Discuss briefly the benefits and limitations of asymmetric key encryption.

c. Explain briefly the fivesteps undertaken in risk analysis

2. a. Describe the procedure involved in automatic password cracking algorithm.

b. Define the following terminologies:

(i) Patent

(ii) Trademark

(iii) Copyright

(iv) Trade Secret

(v) Privacy

c. One of the simplest ways to prevent attackers compromising the network is to customize the settings of the network. Customization of the network settings will give the network administrators an efficient means of monitoring network traffic.

They can also put restrictions on the data, and the information exchanged over the network, to prevent exposure of the company’s network, thus preventing unknown, and unauthenticated, users from accessing the network. In this regard, describe the following components of network security:

(i) Firewall

(ii) Honeypot

3. a. Biometric measurements or personal attributes are used for authentication. These attributes are unique to the individual seeking to authenticate identification.

(i) List any four types of biometrics that are used for authentication 2 Marks

(ii) Discuss the two types of errors that occur when biometrics are used for authentication.

b. (i) Describe briefly the software package called PGP.

(ii) State three things that PGP is basically used for.

Order from us and get better grades. We are the service you have been looking for.