1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
3 years ago
9

__________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.

Computers and Technology
1 answer:
vitfil [10]3 years ago
5 0

Answer:

Cryptography

is the correct answer.

Explanation:

<h2><u>Cryptography</u> offers a mechanism to accomplish four security goals.</h2><h2 />

Cryptography can be defined as technique to format data in such a way that it is Protected. It can be achieved by following goals:

  • Confidentiality is a term that ensures that the data is protected in such a way that it can not be accessed by any unauthorized member. In simpler words any kind of sensitive data is only under the access of people who have authorization key to retrieve or use it.
  • Integrity ensures that the data is real and authenticated. It basically safeguards the actual data.
  • Authentication is a process of verifying an identity by different means. Mostly it includes the the verification by username/password entrance
  • Non-repudiation is basically an surety that the data can't be denied by anyone. Non-repudiation provides the proof that the data is from origin and integrated.

<h3>I hope it will help you!</h3>
You might be interested in
Help me pleseeeeee i will mark u as brainliest
Dovator [93]

Answer:

<!DOCTYPE html>

<html>

 <head>

 <style>

 #header {  

   text-align: center;

   float: left;

 }

 #langtable {

   border: 2px solid blue;

   border-spacing: 5px;

 }

 #langtable th {

     border: 2px solid green;

 }

 #langtable td {

     border: 2px solid green;

     padding: 10px;

 }

 </style>

 </head>

 <body>

   <div id="header">State and languages

   <table id="langtable">

     <tr>  

       <th>State</th>

       <th>Major Spoken Language</th>

     </tr>

     <tr>

       <td>Punjab</td>

       <td>Punjabi</td>

     </tr>

     <tr>

       <td>Jammu and Kashmir</td>

       <td>Kashmiri</td>

     </tr>

     <tr>

       <td>West Bengal</td>

       <td>Bengali</td>

     </tr>

   </table>

   </div>

 </body>

</html>

Explanation:

I think this looks pretty much like it.

7 0
3 years ago
Is the answer a,b,c,d
MariettaO [177]
Well I got some numbers mixed up but I think it’s B
4 0
3 years ago
I am buying a BluRay drive access time is 180ms and the other is 210ms(BD-ROM) whats does access time mean
kkurt [141]
It means how fast it can read the disk so if you want faster data transfer you would go for blurry if you really don't care go for the other one
6 0
3 years ago
Cara is cleaning her computer when she notices a loose cable connecting to her printer. Which two ports would the cable most lik
Ann [662]

Answer:  USB-C

I am 99.5% sure bcuz Im about 90 % because HDMI goes into TVs and stuff

4 0
3 years ago
Read 2 more answers
Explain which are of the brain you think might light up to show that you are telling a lie and why
agasfer [191]
The left side because the right side of the brain handles stuff more on the line of shapes and objects
6 0
3 years ago
Other questions:
  • Krystal recorded her times for all her cross-country meets this season. To sort her data showing the lowest times first, what wi
    14·2 answers
  • Write an expression that evaluates to 1 more than the value in the location pointed to by the integer pointer variable ip. Thus,
    8·1 answer
  • When Amy turns on her computer, she notices a burning smell. Smoke comes out of the case, and Amy immediately turns off her comp
    7·1 answer
  • All digital images are made up from varying rectangles of color, called _____________.
    6·2 answers
  • A collection of facts can be copyrighted, but only if the collection is ____ in a way that causes the resulting work to rise to
    14·1 answer
  • Which of these organs is not found in the excretory system
    7·2 answers
  • If we want to access files located in a directory on a remote server, which of these options would we use?
    9·2 answers
  • String[][] arr = {{"Hello,", "Hi,", "Hey,"}, {"it's", "it is", "it really is"}, {"nice", "great", "a pleasure"},
    11·1 answer
  • Hello everyone! can anybody help me? i need help with computing.
    10·1 answer
  • Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!