Software Security

 

 

Explain your own example of a way in which you are required to prove your identity in some way before getting access to a resource. Does the authenticator fit into the category of something you ‘know’, something you ‘have’, or something you ‘are’?

2) For next week, on File Encryption:

Find and briefly detail your own example of some information technology problem in which encryption provides some benefit, or where you argue *encryption creates problems*. Try to find out what algorithm/technique (DES, AES…) is used.

Encryption is used in more technologies and products that you might realize, from your web browser (TLS/SSL) to smartphone operating systems (Apple IOS) and communication applications, to personal computer operating systems for hard disk encryption. There are applications of encryption not universally accepted in society, for example the use of encryption by criminals to hide activity.

This question has been answered.

Get Answer