CISA Exam-Testing Concept-Asymmetric Encryption (Domain-5)
Par :Formats :
Actuellement indisponible
Cet article est actuellement indisponible, il ne peut pas être commandé sur notre site pour le moment. Nous vous invitons à vous inscrire à l'alerte disponibilité, vous recevrez un e-mail dès que cet ouvrage sera à nouveau disponible.
Disponible dans votre compte client Decitre ou Furet du Nord dès validation de votre commande. Le format ePub est :
- Compatible avec une lecture sur My Vivlio (smartphone, tablette, ordinateur)
- Compatible avec une lecture sur liseuses Vivlio
- Pour les liseuses autres que Vivlio, vous devez utiliser le logiciel Adobe Digital Edition. Non compatible avec la lecture sur les liseuses Kindle, Remarkable et Sony

Notre partenaire de plateforme de lecture numérique où vous retrouverez l'ensemble de vos ebooks gratuitement
Pour en savoir plus sur nos ebooks, consultez notre aide en ligne ici
- FormatePub
- ISBN978-1-370-00880-3
- EAN9781370008803
- Date de parution24/10/2016
- Protection num.pas de protection
- Infos supplémentairesepub
- ÉditeurEditeurs divers USA
Résumé
Point to remember for CISA exam:(1)In any given scenario, when objective is to ensure 'confidentiality', message has to be encrypted using receiver's public key.(2)In any given scenario, when objective is to ensure 'authentication', HASH of the message has to be created and HASH to be encrypted using sender's private key. Please note that hash is also known as message digest.(3)In any given scenario, when objective is to ensure 'integrity', HASH of the message has to be created and HASH to be encrypted using sender's private key.
Please note that hash is also known as message digest.(4)In any given scenario, when objective is to ensure 'confidentiality & authentication', following treatment is required:-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation)-Message to be encrypted using receiver's public key (to ensure confidentiality)(5)In any given scenario, when objective is to ensure 'confidentiality & authentication & integrity', following treatment is required:-Message to be encrypted using receiver's public key (to ensure confidentiality)-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation and integrity)
Please note that hash is also known as message digest.(4)In any given scenario, when objective is to ensure 'confidentiality & authentication', following treatment is required:-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation)-Message to be encrypted using receiver's public key (to ensure confidentiality)(5)In any given scenario, when objective is to ensure 'confidentiality & authentication & integrity', following treatment is required:-Message to be encrypted using receiver's public key (to ensure confidentiality)-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation and integrity)
Point to remember for CISA exam:(1)In any given scenario, when objective is to ensure 'confidentiality', message has to be encrypted using receiver's public key.(2)In any given scenario, when objective is to ensure 'authentication', HASH of the message has to be created and HASH to be encrypted using sender's private key. Please note that hash is also known as message digest.(3)In any given scenario, when objective is to ensure 'integrity', HASH of the message has to be created and HASH to be encrypted using sender's private key.
Please note that hash is also known as message digest.(4)In any given scenario, when objective is to ensure 'confidentiality & authentication', following treatment is required:-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation)-Message to be encrypted using receiver's public key (to ensure confidentiality)(5)In any given scenario, when objective is to ensure 'confidentiality & authentication & integrity', following treatment is required:-Message to be encrypted using receiver's public key (to ensure confidentiality)-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation and integrity)
Please note that hash is also known as message digest.(4)In any given scenario, when objective is to ensure 'confidentiality & authentication', following treatment is required:-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation)-Message to be encrypted using receiver's public key (to ensure confidentiality)(5)In any given scenario, when objective is to ensure 'confidentiality & authentication & integrity', following treatment is required:-Message to be encrypted using receiver's public key (to ensure confidentiality)-Hash of the message to be encrypted using sender's private key (to ensure authentication/non-repudiation and integrity)