The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 398 Weeks Ago, 3 Days Ago |
| Questions Answered: | 66690 |
| Tutorials Posted: | 66688 |
MCS,PHD
Argosy University/ Phoniex University/
Nov-2005 - Oct-2011
Professor
Phoniex University
Oct-2001 - Nov-2016
Draw a matrix similar to Table 1.4 that shows the relationship between security mechanisms and attacks.
Table 1.4Relationship Between Security mechanisms and attacks
|
Service |
Encipherment |
Digital Signature |
Access Control |
Data Integrity |
Authentication Exchange |
Traffic Padding |
Routing Control |
Notarization |
|
Peer Entity Authentication |
Y |
Y |
 |  |
Y |
 |  |  |
|
Data Origin Authentication |
Y |
Y |
 |  |  |  |  |  |
|
Access Control |
 |  |
Y |
 |  |  |  |  |
|
Confidentiality |
Y |
 |  |  |  |  |
Y |
 |
|
Traffic Flow Confidentiality |
Y |
 |  |  |  |
Y |
Y |
 |
|
Data Integrity |
Y |
Y |
 |
Y |
 |  |  |  |
|
Non repudiation |
 |
Y |
 |
Y |
 |  |  |  |
|
Availability |
 |
 |  |
Y |
Y |
 |
Hel-----------lo -----------Sir-----------/Ma-----------dam-----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------and----------- ac-----------qui-----------sit-----------ion----------- of----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n.P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll