Get premium membership and access questions with answers, video lessons as well as revision papers.
- Cryptography is a process of hiding information by altering the actual information into different representation, for example APA can be written as I?X.
- Almost all cryptosystem depend on a key such as a password like the numbers or a phase that can be used to encrypt or decrypt a message.
- The traditional type of cryptosystem used on a computer network is called a symmetric secret key system.
- With this approach, the sender and the recipient use the same key, and they have to keep the share key a secret from anyone else.
Kavungya answered the question on May 10, 2019 at 13:32
- Describe the natural and environmental threats.(Solved)
Describe the natural and environmental threats.
Date posted: May 10, 2019. Answers (1)
- Describe the application controls.(Solved)
Describe the application controls.
Date posted: May 10, 2019. Answers (1)
- Describe the administration controls.(Solved)
Describe the administration controls.
Date posted: May 10, 2019. Answers (1)
- Describe the communication controls.(Solved)
Describe the communication controls.
Date posted: May 10, 2019. Answers (1)
- Describe the data security controls.(Solved)
Describe the data security controls.
Date posted: May 10, 2019. Answers (1)
- Describe the Access control.(Solved)
Describe the Access control.
Date posted: May 10, 2019. Answers (1)
- Describe the general computer controls.(Solved)
Describe the general computer controls.
Date posted: May 10, 2019. Answers (1)
- Explain the defense strategies implemented for computer crimes.(Solved)
Explain the defense strategies implemented for computer crimes.
Date posted: May 10, 2019. Answers (1)
- Describe intentional threats.(Solved)
Describe intentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe Unintentional threats.(Solved)
Describe Unintentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe computer systems Vulnerability.(Solved)
Describe computer systems Vulnerability.
Date posted: May 10, 2019. Answers (1)
- Describe the database availability.(Solved)
Describe the database availability.
Date posted: May 10, 2019. Answers (1)
- Describe the database management systems security features.(Solved)
Describe the database management systems security features.
Date posted: May 10, 2019. Answers (1)
- Outline the database security issues.(Solved)
Outline the database security issues.
Date posted: May 10, 2019. Answers (1)
- Describe database security.(Solved)
Describe database security.
Date posted: May 10, 2019. Answers (1)
- State and explain the contents of a database.(Solved)
State and explain the contents of a database.
Date posted: May 10, 2019. Answers (1)
- Explain the disadvantages of database approach.(Solved)
Explain the disadvantages of database approach.
Date posted: May 10, 2019. Answers (1)
- State and explain the features that characterize a database approach.(Solved)
State and explain the features that characterize a database approach.
Date posted: May 10, 2019. Answers (1)
- State and explain the Limitations of a file system.(Solved)
State and explain the Limitations of a file system.
Date posted: May 10, 2019. Answers (1)
- Describe file systems.(Solved)
Describe file systems.
Date posted: May 10, 2019. Answers (1)