CISA Exam-Testing Concept-Asymmetric Encryption (Domain-5)

Par : Hemang Doshi
Actuellement indisponible
Cet article est actuellement indisponible, il ne peut pas être commandé sur notre site pour le moment. Nous vous invitons à vous inscrire à l'alerte disponibilité, vous recevrez un e-mail dès que cet ouvrage sera à nouveau disponible.
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
  • Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
  • Compatible avec une lecture sur liseuses Vivlio
  • Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony
Logo Vivlio, qui est-ce ?

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement

Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
C'est si simple ! Lisez votre ebook avec l'app Vivlio sur votre tablette, mobile ou ordinateur :
Google PlayApp Store
  • FormatePub
  • ISBN978-1-370-00880-3
  • EAN9781370008803
  • Date de parution24/10/2016
  • Protection num.pas de protection
  • Infos supplémentairesepub
  • ÉditeurEditeurs divers USA

Résumé

Point to remember for CISA exam:(1)In any given scenario, when objective is to ensure 'confidentiality', message has to be encrypted using receiver's public key.(2)In any given scenario, when objective is to ensure 'authentication', HASH of the message has to be created and HASH to be encrypted using sender's private key. Please note that hash is also known as message digest.(3)In any given scenario, when objective is to ensure 'integrity', HASH of the message has to be created and HASH to be encrypted using sender's private key.
Please note that hash is also known as message digest.(4)In any given scenario, when objective is to ensure 'confidentiality & authentication', following treatment is required:-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation)-Message to be encrypted using receiver's public key (to ensure confidentiality)(5)In any given scenario, when objective is to ensure 'confidentiality & authentication & integrity', following treatment is required:-Message to be encrypted using receiver's public key (to ensure confidentiality)-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation and integrity)
Point to remember for CISA exam:(1)In any given scenario, when objective is to ensure 'confidentiality', message has to be encrypted using receiver's public key.(2)In any given scenario, when objective is to ensure 'authentication', HASH of the message has to be created and HASH to be encrypted using sender's private key. Please note that hash is also known as message digest.(3)In any given scenario, when objective is to ensure 'integrity', HASH of the message has to be created and HASH to be encrypted using sender's private key.
Please note that hash is also known as message digest.(4)In any given scenario, when objective is to ensure 'confidentiality & authentication', following treatment is required:-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation)-Message to be encrypted using receiver's public key (to ensure confidentiality)(5)In any given scenario, when objective is to ensure 'confidentiality & authentication & integrity', following treatment is required:-Message to be encrypted using receiver's public key (to ensure confidentiality)-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation and integrity)
CRISC Exam - Study Guide
Hemang Doshi
E-book
9,49 €