1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bas_tet [7]
4 years ago
14

Charlie was getting ready to head home when the phone rang- Caller ID showed it was Peter- "Hi, Peter," Charlie said into the re

ceiver- "Want me to start the file cracker on your spreadsheet????" "No, thanks," Peter answered, taking the joke well- "I remembered my passphrase- But I want to get your advice on what we need to do to make the use of encryption more effective and to get it properly licensed for the whole company- I see the value in using it for certain kinds of information, but I'm worried about forgetting a passphrase again, or even worse, that someone else forgets a passphrase or leaves the company- How would we get their files back????" "We need to use a feature called key recovery, which is usually part of PKI software," said Charlie- "Actually, if we invest in PKI software, we could solve that problem as well as several others-" "OK," said Peter- "Can you see me tomorrow at 10 o'clock to talk about this PKI solution and how we can make better use of encryption????"
a- Was Charlie exaggerating when he gave Peter an estimate for the time required to crack the encryption key using a brute force attack?
b- Are there any tools that someone like Peter could use safely, other than a PKI-based system that implements key recovery, to avoid losing his passphrase? Suppose Charlie had installed key logger software on all company computer systems and had made a copy of Peter's encryption key- Suppose that Charlie had this done without policy authority and without anyone's knowledge, including Peter's-
c- Would the use of such a tool be an ethical violation on Charlie's part? Is it illegal? Suppose that Charlie had implemented the key logger with the knowledge and approval of senior company executives, and that every employee had signed a release that acknowledged the company can record all information entered on company systems- Two days after Peter's call, Charlie calls back to give Peter his key: "We got lucky and cracked it early-" Charlie says this to preserve Peter's illusion of privacy-
d- Is such a "little white lie" an ethical action on Charlie's part?
Computers and Technology
1 answer:
Flauer [41]4 years ago
6 0

Answer and Explanation:

I assume Charlie is saying that it will take couple of minutes to crack passphrase using brute force attack. If this is the case then Yes Charlie is exaggerating in this matter. As the time required to break the passphrase depends on the length of the passphrase. More the length, more will be the possibilities or permutations which needed to be tested. So couple of minutes are not enough even if passphrase length is short.

If my assumption is wrong and Charlie is saying that it will take couple of million years to break the passphrase, then also this exaggeration, as, million years is alot of time, and breaking a passphrase of finite length will take alot of time but not in terms of million years.

There are alot of tools available other than PKI based which can be used to crack password. eg. There are some black hat softwares available such as Hiren Boot CD, Windows Password Changer (WPC), etc

You might be interested in
Which of the following is not an advantage of a dbms?
vovikov84 [41]
I looked it up and A seems to be it
7 0
3 years ago
Read 2 more answers
Hi, please help me, solution.​
loris [4]

Answer:

error: incompatible types

Explanation:

Given

The attached code

Required

The output

Variable "a" is declared as float

While p is declared as a pointer to an integer variable

An error of incompatible types will be returned on line 3, <em>int *p = a;</em>

Because the variables are not the same.

To assign a to p*, we have to use type casting.

Hence, (b) is correct

5 0
3 years ago
Which of the following is NOT a reason to include comments in programs
wel

Answer:

C. Comments help document how code was written for other programmers to use.

Explanation:

I think it i C.

7 0
3 years ago
Read 2 more answers
Items on a storage medium remain intact even when power is removed from the computer. what term describes this characteristic?
stellarik [79]
Non-volatile, persistent or permanent storage are terms used for this.
7 0
3 years ago
Select the correct text in the passage.
Len [333]

Answer:

The appropriate guidelines to create and manage files in the passage:

O.  First, (select a central location to organize all your files, folders, and sub-folders).

O.  Then double-click the folder or folders to identify which file you want to move.

O.   Now (use Windows Explorer to navigate and paste the file in the

required location).

The correct text in the passage is:

O.   It is a great idea to (categorize your data into folders.) It is even better to (segregate them further into sub-folders.) If you maintain a list of  sub-folders under every main folder, you will be able to access all your tasks easily. For example, you could put your school subjects under  different sub-folders to organize your data efficiently on your computer.

Explanation:

8 0
3 years ago
Other questions:
  • Which of the following is not true of credit cards
    15·1 answer
  • If you add 111 and 0101 in 4-bit signed fields, is there a carry or overflow?
    15·1 answer
  • I need help <br> Match each words with its definition!!!<br> Please helpppppppp
    12·1 answer
  • Which image shows organic shapes? <br> A. image 1 <br> B. image 2 <br> C. image 3 <br> D. image 4
    14·2 answers
  • What justification can you give for normalizing a database if the database will be updated only by the people who can be trusted
    11·1 answer
  • An
    9·1 answer
  • If you are interested in working for a specific company, what type of job site should you look at for opening?
    12·1 answer
  • What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the spe
    6·1 answer
  • A short story, but i remember in 1nd - 5th grade at my elementary school here is the list from first to last for being cool at s
    9·2 answers
  • Petra notices that there are a number of issues with a new fiber optic connection whose status appears to be going up and down c
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!