1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vladimir1956 [14]
3 years ago
9

Keeping a copy of an encryption key with a trusted third party is known as

English
1 answer:
aniked [119]3 years ago
3 0

Keeping a copy of an encryption key with a trusted third party is known as password escrow. Doing a password escrow is one way to secure encryption keys.  

EXPLANATION:  

Password escrow or simply called escrow is when the trusted third party holds and keeps an item for individual or company until a certain period of time or specific condition arises. It is one way that is generally done by an institution to safeguard the encryption key. Actually, there are other ways to secure encryption keys. Here is the list:

  • Secure encryption system physically. The systems and the machines which run and store the encryption programs have to be physically secured with locked doors and other appropriate treatment.  
  • Separate encryption keys with the data they decrypt. When the encryption keys and the data used to unlock are in the same machines, the encryption keys will be compromised when the machine is compromised.  
  • Doing an audit trail. Audit trail avoids keys to be compromised and serving crucial data or information if there are data breaches.
  • Maintain a secure and updated backup. Keeping all of the encryption keys in one secure machine is very risky because when the machine fails, the encryption keys will be in damage.  
  • Manage encryption key life-cycle. No matter how well the encryption keys being secured, if they are expired without a new key being saved, issued, secured, and backed up, the keys will be useless.  
  • Create a key recovery procedure. Unintended data loss commonly happens. Accidental data will damage the encryption keys. Thus, making sure that there is a key recovery procedure will be very helpful to guarantee that the data will always be accessible no matter what happens.  
  • Change the keys periodically. Changing keys periodically will prevent unauthorized access to keys.  

LEARN MORE:  

If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:

1. Which of the following would typically be paid through an escrow account? brainly.com/question/2312030  

KEYWORDS:  password escrow, keeping a copy of an encryption key with trusted third party,  

Subject: English

Class: 7-9  

Sub-chapter: Password escrow  

You might be interested in
Which word does not suggest use of the mind? A. improvise B. ostentation C. speculate D. visionary D!?
AlekseyPX
D: visionary because that has to do with sight.
HOPE I HELPED!!!
6 0
3 years ago
Read 2 more answers
Before 1933, what did parts of California’s Central Valley not have enough water for
kari74 [83]

Answer:

The Central Valley Project (CVP) is a federal power and water management project in the U.S. state of California under the supervision of the United States Bureau of Reclamation (USBR). It was devised in 1933 in order to provide irrigation and municipal water to much of California's Central Valley—by regulating and storing water in reservoirs in the northern half of the state (once considered water-rich but suffering water-scarce conditions more than half the year in most years), and transporting it to the water-poor San Joaquin Valley and its surroundings by means of a series of canals, aqueducts and pump plants, some shared with the California State Water Project (SWP). Many CVP water users are represented by the Central Valley Project Water Association.

In addition to water storage and regulation, the system has a hydroelectric capacity of over 2,000 megawatts, and provides recreation and flood control with its twenty dams and reservoirs. It has allowed major cities to grow along Valley rivers which previously would flood each spring, and transformed the semi-arid desert environment of the San Joaquin Valley into productive farmland. Freshwater stored in Sacramento River reservoirs and released downriver during dry periods prevents salt water from intruding into the Sacramento-San Joaquin Delta during high tide. There are eight divisions of the project and ten corresponding units, many of which operate in conjunction, while others are independent of the rest of the network. California agriculture and related industries now directly account for 7% of the gross state product for which the CVP supplied water for about half.

Many CVP operations have had considerable environmental consequences, including a decline in the salmon population of four major California rivers in the northern state, and the reduction of riparian zones and wetlands. Many historical sites and Native American tribal lands have been flooded by CVP reservoirs. In addition, runoff from intensive irrigation has polluted rivers and groundwater. The Central Valley Project Improvement Act, passed in 1992, intends to alleviate some of the problems associated with the CVP with programs like the Refuge Water Supply Program.

In recent years, a combination of drought and regulatory decisions passed based on the Endangered Species Act of 1973 have forced Reclamation to turn off much of the water for the west side of the San Joaquin Valley in order to protect the fragile ecosystem in the Sacramento-San Joaquin Delta and keep alive the dwindling fish populations of Northern and Central California rivers. In 2017 the Klamath and Trinity rivers witnessed the worst fall run Chinook salmon return in recorded history, leading to a disaster declaration in California and Oregon due to the loss of the commercial fisheries. The recreational fall Chinook salmon fishery in both the ocean and the Trinity and Klamath rivers was also closed in 2017. Only 1,123 adult winter Chinook salmon returned to the Sacramento Valley in 2017, according to a report sent to the Pacific Fishery Management Council (PFMC) by the California Department of Fish and Wildlife (CDFW). This is the second lowest number of returning adult winter run salmon since modern counting techniques were implemented in 2003. By comparison, over 117,000 winter Chinooks returned to spawn in 1969

Explanation:

6 0
3 years ago
What’s the correct answer
Leokris [45]

Answer: Body Language.

Explanation:

6 0
3 years ago
Read 2 more answers
13 Jesus Christ is the only Saviour for all sinners. what are the subject , linking verb, and predicate noun​
julsineya [31]

Answer:

subject: Jesus Christ

linking verb: is

Predicate noun: the only saviour

8 0
2 years ago
A passive verb is a good choice if you wish to: A. establish a formal tone.
jenyasd209 [6]
The correct answer is to B. De-emphasize the subject.

Very often the subject can be completely omitted.

Burglars committed the crime
The crime was committed (by the burglars).

In the passive version, the subject is irrelevant.
3 0
3 years ago
Read 2 more answers
Other questions:
  • which sentence is punctuated correctly? the aliens suffered from exhaustion, after traveling several light years. they needed so
    8·2 answers
  • Amber wanted so badly for the girls on the squad to accept her. She knew if she went to the party, they would. However, she had
    11·1 answer
  • What is most likely the definition of the word embroil?
    9·2 answers
  • In the sentence what is the cause and effect 
    15·2 answers
  • In which sentence does the underlined adverb clause modify an adverb?
    5·2 answers
  • 100 POINTS + BRAINLIEST + 5 STAR RATING FOR THE CORRECT ANSWER!!!!!
    8·1 answer
  • Can some please help me write a loving good morning text
    12·2 answers
  • The childrens mom sign them up for dance lessons what is yhe subject?
    11·1 answer
  • Which features must an opinion have to be considered a claim? Select three options.
    5·2 answers
  • _____ poetry imitates the rhythm of ordinary speech and does not have a consistent meter and rhyme scheme.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!