8/16/22, 8:33 AM Exam #2 https://umsystem.instructure.com/courses/118743/assignments/ XXXXXXXXXX/2 CS 5601 XXXXXXXXXXExam 2 Instructions: Read the question carefully. Some can be interpreted in...

1 answer below »

View more »
Answered 4 days AfterOct 02, 2022

Answer To: 8/16/22, 8:33 AM Exam #2 https://umsystem.instructure.com/courses/118743/assignments/ XXXXXXXXXX/2...

Shubham answered on Oct 06 2022
69 Votes
SYMMETRIC ENCRYPTION ALGORITHM
Table of Contents
Question 1    2
Question 2    2
Question 3    2
Question 4    3
Question 5    3
Question 6    3
Question 7    3
Question 8    4
Question 9    4
Question 10    4
Question 11    4
Question 12    5
Question 13    5
Question 14    5
Question 15    5
Question 16    6
Question 17    6
Question 18    6
Question 19    7
Question 20    7
References    8
Question 1
Symmetric encryption a
lgorithm is the type of secret key that is used for both decrypting and encrypting electronic data. It includes entities for communicating through symmetric encryption that must exchange keys that can be used by the decryption process. The major issue with symmetric encryption algorithms is key exchange problems that can be presented on a classic catch-22 (Kaur, and Vijay Kumar, 2020). The other main issue with the problem is trust between two parties for sharing the secret symmetric key.
Question 2
Security cameras should be present at every entrance and exit of the organization as it can help in preventing crimes at a high rate. Several crimes can be prevented and it can be a great help for the company and the crime department to keep an eye on every suspect that is visible. The use of security cameras can help in following modern technology that can work efficiently and smoothly for ensuring security of the premises.
Question 3
Metasploit framework is the tool that can help in identifying, validating and exploiting vulnerabilities. It can help in delivering tools, content and infrastructure for conducting extensive security audits along with penetration testing. The pen testing can use custom code and it is introduced with the network to probe for weak spots (Geetha, S., et al. 2018). It can help in identification of weak spots and getting the information that can be used for addressing systemic weakness and prioritizing solutions. The framework has become go-to exploit development and it is used as a mitigation tool.
Question 4
Human attacks seen in information security include SMiShing, Phishing, Vishing and Impersonation. Phishing includes malicious emails that pretend to be from reputable sources, SMiShing is phishing through SMS and text, Vishing is voice phishing that uses phone or VoIP and Impersonation is the physical impersonation from a trusted person. These attacks can be mitigated by introducing policies that can help in preventing attackers from learning about internetworking of the organization. It is recommended that users choose a secure network for accessing personal information and ensure that privacy settings are configured properly.
Question 5
Electronic emanations are the problem of leakage of information from the computer system or the network through the electromagnetic radiation. The protection has not improved as the computer technology has increased (Seth, Bijeta, et al. 2022). It creates more abruption of transition and it includes use of more high-frequency components in the spectrum. The risk can be reduced by reducing the error and using the algorithm for providing corrections.
Question 6
Smoke detector provides a faster response and it may be liable for giving a false alarm. It has a constant electrical current running between metal plates inside the device. It is disrupted when the smoke enters the device chamber and triggers the alarm. It can quickly identify fires that are fast burning. In the device the light beam is scattered when it triggers the alarm.
Question 7
The use of a chemical foam suppression system can be the suppression choice for the data center that is not occupied with staff. It is one of the common places of fire to start. The chemical foam system is designed for these types of conditions (Kumar, Amogh Saxena, and Sai Satvik Vuppala, 2020). It includes use of several systems and it required fitting made and pipe-work from the stainless steel. The form system can be used when the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here
April
January
February
March
April
May
June
July
August
September
October
November
December
2025
2025
2026
2027
SunMonTueWedThuFriSat
30
31
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
00:00
00:30
01:00
01:30
02:00
02:30
03:00
03:30
04:00
04:30
05:00
05:30
06:00
06:30
07:00
07:30
08:00
08:30
09:00
09:30
10:00
10:30
11:00
11:30
12:00
12:30
13:00
13:30
14:00
14:30
15:00
15:30
16:00
16:30
17:00
17:30
18:00
18:30
19:00
19:30
20:00
20:30
21:00
21:30
22:00
22:30
23:00
23:30