1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arturiano [62]
3 years ago
15

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest

concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Write down an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation.
Computers and Technology
1 answer:
Y_Kistochka [10]3 years ago
3 0

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

You might be interested in
Describe the three criteria you should use to determine if an online media source should be included in your paper or presentati
VikaD [51]
<span>To use an online resource, it should be relevant to the topic. It should be credible, coming from an expert on the topic. Finally, it should be valid, coming from a source that is based in truth or fact.</span>
7 0
3 years ago
Read 2 more answers
âwhat service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?
Vera_Pavlovna [14]
<span>The answer should be: Virtual Desktop Infrastructure</span>
5 0
4 years ago
Which process is based on repulsion of oil and water?
Tasya [4]
E.........................
4 0
3 years ago
Data that can be used to identity a single individual is known as
lys-0071 [83]

Answer:

Fingerprint Recognition

Explanation:

3 0
4 years ago
Which feature of spreadsheet software will make it easier for you to find the average number of calls made per hour for each emp
max2010maxim [7]

Answer:

It's formula and functions

Explanation:

6 0
4 years ago
Other questions:
  • The rubric given to them by their teacher requires that
    14·1 answer
  • Your company runs a commercial website that enables your business partners to purchase products and manage their accounts. You w
    9·1 answer
  • Question 4 of 10
    5·1 answer
  • Which pane displays commands that change relative to the activity taking place in the presentation window's main work area?
    15·1 answer
  • Sleeping is an effect of _______ , but agitation may cause a person to wake up
    7·2 answers
  • If you find yourself in a position where you need to restore an object or container within active directory that has been inadve
    6·1 answer
  • Sabiendo que el engranaje motriz tiene 14 dientes y gira a 4000 RPM, y el conducido tiene 56 dientes, responde:
    11·1 answer
  • If I wanna records a game and my voice need to be in the video what app I download.
    7·2 answers
  • Byron wants to use Quick Parts to insert reusable content into a company Word document. Where will he access this option? Design
    11·2 answers
  • How can computational thinking techniques be applied to software development
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!