AllBestEssays.com - All Best Essays, Term Papers and Book Report
Search

Cryptography Exercise

Essay by   •  April 27, 2013  •  Essay  •  258 Words (2 Pages)  •  1,298 Views

Essay Preview: Cryptography Exercise

Report this essay
Page 1 of 2

2. Financial Loss - the cost of computers and hardware

The loss of data and information - companies may store employees and customers' information on their databases on the computers.

Lawsuits/ Legal action - the company may suffer legal action and scrutiny from customers because of the sensitive data loss.

3. Confidentiality and integrity is at risk.

The company will have a lack of customers (they won't trust the company anymore)

Blackmailing can occur.

4. Data vulnerabilities

Programs and data can be altered by the attacker which can lead to the inability to function

5. Example 1 - a vehicle's software can be edited and/or changed by using a laptop wirelessly or by plugging it into a USB port. However, most vehicle software is enhanced so that few security attacks can take place.

8. Software controls can be implemented for example internal program controls. This means that parts of certain programs enforces security restrictions. Restrictions can also be placed upon the operating system. This feature enforced by the operating system is to protect the user from all other users on the same network.

Encryption and special logins are used to block out certain users and disable them from seeing any information not meant for them.

9. Electronic spy - is a person or a gadget placed by a person on a network infrastructure or computer network to gather specified information.

Information broker - can be a person or a company that searches specified information for its clients/ customers.

...

...

Download as:   txt (1.5 Kb)   pdf (45.1 Kb)   docx (9.1 Kb)  
Continue for 1 more page »
Only available on AllBestEssays.com