Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1-Describe the three goals of cryptography.? 2-Draw a table showing if hashing a

ID: 3688914 • Letter: 1

Question

1-Describe the three goals of cryptography.?

2-Draw a table showing if hashing and data signature meet the goals of cryptography ?

3-Cite at least two examples of incidents for each of the incidents severity levels which are level 1,2, and 3 each one cite 2 example?

4-How the company should act with employees that report false positive incidents?

NOTE: please NO plagiarism I need an exactly answer for IT Security Course to theses questions

goals Hashing Data signture Confidentiality Integrity Authenticity/nonrepudiation

Explanation / Answer

1-Describe the three goals of cryptography.?

Answer : The three goals of cryptography are Confidentiality,Integrity and Authentication.
   Confidentiality:   Ensuring that information is accessible only to those authorised to have access.
   Integrity:            This goal of cryptography ensures to maintain the originality of data and protect data from

unauthorised modification.       
   Authentication:   It should be possible for the receiver of a message to ascertain its origin.An intruder should not

                             be able to masquerade as someone else.

2-Draw a table showing if hashing and data signature meet the goals of cryptography ?

Answer:

3-Cite at least two examples of incidents for each of the incidents severity levels which are level 1,2, and 3 each one cite 2 example?

Answer:

4-How the company should act with employees that report false positive incidents?

Answer:

Emergency response is initiated by escalation of a security event or be direct declaration by the CIO or other
executive organization staff. The CIO may assign the incident coordinator, but by default, the coordinator will be
the most senior security staff member available at the time of the incident.The incident coordinator assembles the incident response team. The team meets using a pre-defined conference meeting space. One among CIO or CSO or Director IT must attend each incident team meeting.The meeting minutes capture the status, actions and resolutionfor the incident.The incident coordinator reports on the cost, exposure and continuing business risk of the incident.The incident response team determines the next course of action.The team provides a written report to senior management and the issue is handled as either a normal incident or it is closed.Review and analyze log data to determine nature and scope of incident. This step should include utilizing virus,spyware, rootkit and other deection tools to determine necessary mitigation and repair.Repair systems, eliminate vector of attack, and mitigate exploitable vulnerabilities.The Test Report documents the validation of the repair process.Investigate incident to determine source of attack and capture perpetrator. This will require the use of forensics tools,log analysis,clean lab and dirty lab environments and possible communication with Law Enforcement or otherentities.The “Investigation Status Report” captures all current information regarding the incident. The Incident response team uses this information to determine the next course of action.

Goals           Hashing                 Digital Signature Confidentiality Integrity             Yes                 Yes Authentication/Nonrepudiation              Yes                 Yes