1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
4 years ago
4

NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. Al

l employees communicate using smartphones and email. Many employees work from home and travel extensively. NetSecIT would like to implement an asymmetric general-purpose encryption technology that is very difficult to break and has a compact design so that there is not a lot of overhead. What encryption solution that best meets the company's needs and justify the recommendation?
Computers and Technology
1 answer:
RSB [31]4 years ago
6 0

Answer and Explanation:

Basically, NetSecIT is a software house where employees are connecting with each other through 120,000 computers and 45,000 servers. They are communicating using smartphones and email. For this purpose, NetSecIt implements asymmetric encryption in their software house. Lets us clear the Asymmetric Encryption first.

Asymmetric Encryption

Asymmetric encryption is used for encrypting and digitally signing data.It involved in communication as well. It has two major algorithm which has been used according to situation.  

Major Algorithms are

  • Diffie-Hellman key agreement (DH)
  • Rivest Shamir Adleman (RSA)
  • Elliptic Curve Cryto graph y (ECG)
  • Digital Signature Algorithm (DSA)    

Diffie-Hellman key agreement (DH)

DH is not for encryption and decryption of data but it is used when two parties are involved in communication. they generate a key for exchange the information.

For example  

we have two parties that is Q1 and Q2  

Both parties had choose two integers p and l then  

1<p<l.

Q1 chooses randomly an integer i and send it to Q2 using variable p B=a^i

Q2 chooses a randomly an integer j and send it to Q1 using variable p C=a^j

Q1 computes m1 = B^i mode l

Q2 computes m2 = C^i mode l

then m1 and m2 are secret keys.

Similarly  

Rivest Shamir Adleman (RSA)

RSA is using for encryption and decryption.  

Elliptic Curve Cryto graph y (ECG)

is basically used for smaller devices like cell phones.It requires less computing power compared with RSA. ECG based on a curve that contain public / private key pair

Digital Signature Algorithm (DSA)

DSA is used for creating some digital signals faster than validating it.

All these algorithm has been used for encryption  

So as NetSecIt has a general purpose of using encryption technology so after a brief description of asymmetric encryption you can see that its some algorithm have better impact on the situation such as Digital Signature Algorithm DSA , RSA and Elliptic Curve Cryto graph y (ECG). So company has to used some algorithm for using asymmetric algorithm in their company then they will communicate with their employee and employee communicate using smartphone and email.Hence proved encryption solution is a best meet the company's needs.

You might be interested in
Choose the word pair that would best complete this analogy <br> annihilation : obliteration
iogann1982 [59]
Annihilation : obliteration

if the choices were:

strategy : tactics
sensation : numbness
deliberation : impulsiveness
endeavor : quit 

Then the word pair that would best complete the analogy is:
STRATEGY : TACTICS

Annihilation and obliteration are synonymous. In fact, annihilation is defined as complete destruction or complete obliteration. Obliteration is defined as total destruction.

Strategy and tactics are also synonymous. They both mean a system or mode of procedure or a plan of action.

The rest of the choices are antonyms.
8 0
3 years ago
What precautions should be taken to make a computer more secure ​
Sergeeva-Olga [200]

Answer:

To make a computer more secure

Explanation:

we have following ways :

1)we should have anti virus to protect our computer.

2)we should not play or look computer for a long time because it destroy our files

4 0
3 years ago
2 4.1.2 Quiz: Information Systems and Business Planning
Delicious77 [7]

Answer:

Option D

Explanation:

Complete question

A management information system is typically used by _____.

A. all levels of employees

B. company executives

C. upper-level managers

D. middle-level managers

Solution

A management information system is typically used by middle-level managers

Option D is the correct answer

Management information system (MIS) helps the middle managers to control the work across the various teams of organization.

5 0
3 years ago
A software program that allows you to create professional looking multimedia presentations. Question 1 options: Excel 365 Word 3
maks197457 [2]

Powerpoint is a program that allows  us to create professional looking multimedia presentations.

<h3>What is Multimedia presentations?</h3>

A multimedia presentation is a way of communication where we use audio,vedio,arts,drawings and other various ways to present communcations.

<h3>Why Ms-PowerPoint ?</h3>

Ms-PowerPoint consists of some simple and understandable features to make notes through slides create vedio and vedio editing, Coral Draws Audio editing etc.

We can create banners,record vedios,draw and design with the help of tools provided by powerpoint.

Powerpoint also helps to transform boring presentation to an eye catching presentation.

Learn more about PowerPoint here:brainly.com/question/10117380

4 0
2 years ago
What could be one possible reason where the recipient is not guaranteed that the data being streamed will not get interrupted?
anyanavicka [17]

Answer

The senders PC is using UDP protocol

Explanation

UDP is the User Datagram Protocol which is used as an alternative communication protocol to the TCP which is used primarily for establishing low latency and loss of tolerating connections between applications on the internet UDP is normally used by the programs running on different computers on a network. Its purposes is to send short messages which are datagrams. It is not much reliable because of its occasional loss of packet. Due to this packet loss  the recipient is not guaranteed that the data being streamed will not get interrupted. This is because If a router on the Internet starts getting overloaded, or a packet gets corrupted due to interference or anything, the packet will be dropped unlike the TCP (Transmission control  protocol)which resend the packets and keeps re sending. The UDP does not resend the packets which are dropped. Once they are dropped that all.


3 0
3 years ago
Other questions:
  • You have connected thirteen pcs and laptops to a wireless network. to make your wlan more secure, what should you do to disallow
    11·1 answer
  • Which of the following correctly pairs a financing option with its description?
    14·2 answers
  • What is that black thing on my wall?
    9·1 answer
  • Which of the following is an example of constructive criticism for a friend who speaks too softly?
    13·2 answers
  • The following is the pseudocode for which type of algorithm? For maxElement = each subscript in the array, from the last to the
    14·1 answer
  • To use Click and type feature can be used to format and enter text graphic and other items
    6·1 answer
  • Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times
    5·1 answer
  • Select the correct answer from each drop-down menu.
    5·2 answers
  • I NEED THIS ASAP
    12·2 answers
  • What is the relationship between hardware and software technology tools?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!