ORDER YOUR PAPER AND GET QUALITY FOR YOUR MONEY
NOTE: This is a computer science/forensics assignment in which the question is about encryption.Question: Consider an automated teller machine (ATM) in which users provided a personal identification number (PIN) and a card for account access. Give examples of confidentiality, integrity, and availability requirements associated with the system and, in each case, indicate the degree of importance of the requirement.Also, While on the stand, a defense attorney asks you to explain for the jury the difference between an encryption private key and a public key and how these keys are used. What is your answer?Lastly, The company that hired you believes that their hardware systems have been compromised. You discover that their systems use the 56-bit Data Encryption Standard (DES). Explain to them their problem(s) and possible solution(s).
0 comments