Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Provide an example of at least one application (if there are any such applicatio

ID: 3875368 • Letter: P

Question

Provide an example of at least one application (if there are any such applications) where:

(a) data integrity is more important than data confidentiality;

(b) entity authentication is more important than data origin authentication;

(c) entity authentication and data origin authentication are both required;

(d) data origin authentication is necessary but non-repudiation is not necessarily required;

(e) data integrity is required but not data origin authentication;

(f) data origin authentication is required but not data integrity;

(g) entity authentication is provided using more than one mechanism.

Explanation / Answer

a) Bank transactions and election results are few places where data integrity is much more needed than confidentiality.

b) Cryptography or encryption of data is entity authentication, which is more important than the origin of data.

c) Passwords, Biometrics or ATM cards and pins

d) This hapens in applications where there are two processes running as the same user. TCP sockets on localhost help them to communicate with each other. It is necessary to identity the peer to avoid local restrictions or collisions. Thus, non-repudiation is not necessarily required.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote