A) What does the second Law of Identity say? Let\'s say there is an online shop
ID: 3919543 • Letter: A
Question
A)
What does the second Law of Identity say?
Let's say there is an online shop with search function, shopping cart, registration, ...
What does the second Law of Identity mean for this scenario?
B)
An attacker manages to intercept a TGT and he comes to the sessionkey of a user:
-> Can the attacker now use the Kerberos service on behalf of the user?
-> Can the attacker also request the service on behalf of other users?
C)
There is a public key authentication service.
The service has the public keys of all participants:
Where is the advantage of public key authentication compared to password authentication?
A new participant logs in to the service. How can the service be authenticity
of the new subscriber? The communication is carried out via a secure channel.
What needs to be changed in the previous scenario when communicating over an unsecured channel?
Explanation / Answer
Please Note: Your Post contains more than one Question. As per Chegg Guidelines, I have answered the first question. Please Re-Post for other Questions.
A)
What does the second Law of Identity say?
Let's say there is an online shop with search function, shopping cart, registration, ...
What does the second Law of Identity mean for this scenario?
Answer)
The second Law of Identity means the MINIMAL DISCLOSURE FOR A CONSTRAINED USE of an application. It means that the system should display and identify the least information possible to display and this is the most stable, long-term solution and also most protective as it protects the system by disclosing only the minimal information which is required.
If there is an online shop with search function, shopping cart, registration, etc. the second Law of Identity will mean for this scenario that registration includes only collection of as minimum information that is required for the customer to perform actions on the system, shopping cart of the customer should be visible to only authorized individuals who need to work and track that and no other than that. Also, search function should provide output which is relevant to the customer and his region and not beyond that. The online shop should function based on revealing and collecting minimal information and thus implementing the second Law of Identity.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.