The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 314 Weeks Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
I am attempting to achieve the perfect storm in data and transactional security.
I want to insure that four security “components” will be achieved in any message I send between my location at point “A” and any recipient, as well as any message sent to me, from any sender, across any communications medium.
My communications MUST achieve the following:
1. Confidentiality
2. Integrity
3. Non-repudiation
4. Authentication
Given the material covered this week in Chapter 9, and any materials available to you via research on the Internet, provide me with a recommendation identifying all necessary elements, in their proper order/sequence/relationship that will allow me to achieve my objective.
Hint: Your response will need to address concepts and technologies such as hashing, public and private keys, as well as digital signatures.
----------- ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly