Tag: security
Questions Related to security
-
Discretionary access control
-
Separation of duties
-
Least privilege
-
Rotation of duties
-
Validation
-
Need to know
-
Consensus
-
Verification
-
Revoking credentials
-
Encryption
-
Communications
-
Placement
-
Consistent time-out enforcement across platforms
-
A compromised password exposes all authorized resources
-
Use of multiple passwords to remember
-
Password change control
-
Denial of services
-
Fires, floods, and hurricanes
-
Unreadable backup tapes
-
Unauthorized transactions
-
Encryption of data
-
Access controls
-
Nonrepudiation
-
Steganography
-
Protection of the private key
-
Distribution of the shared key
-
Integrity of the message
-
History of session keys
-
Encrypting the message with the receiver's public key
-
Encrypting a hash of the message
-
Having the message authenticated by a certificate authority
-
Using a password-protected file format
-
Send a digital signature of the message to the recipient
-
Encrypt the message with a symmetric algorithm and send it
-
Encrypt the message with a private key so the recipient can decrypt with the corresponding public key
-
Send an encrypted hash of the message along with the message to the recipient
-
Substitution and transposition
-
Block and stream
-
Symmetric and asymmetric
-
DES and AES