1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
3 years ago
14

What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption

Computers and Technology
1 answer:
ankoles [38]3 years ago
6 0

<u>Explanation:</u>

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major <u>advantage</u> of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main<u> disadvantage</u> of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. <u>A major </u><u>advantage</u><u> of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), </u><u>a disadvantage.</u>

You might be interested in
You're a teacher and you've created a form letter in word that you send to the parents of the students in your class at the begi
Daniel [21]

Answer:

The letter pulls parents' names and addresses, along with the children's names, from an Excel file you get from the main office. To make your form letter word with the updated Excel file, Create a new form letter in Word and use the mail merge feature to link it to the updated Excel file.

Explanation:

7 0
2 years ago
Web sites use _____ to track users while they are on the site.
Liula [17]
These are files called cookies. =)
6 0
3 years ago
A cyberbully is someone who invades another person’s privacy by
e-lub [12.9K]
Insulting or harassing them over the Internet
8 0
4 years ago
Read 2 more answers
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which
jenyasd209 [6]
Manager there SUbMiT
7 0
3 years ago
Read 2 more answers
The ______ Works on a single variable or constant. *​
lora16 [44]

Answer:

man

Explanation:

6 0
3 years ago
Other questions:
  • In what order does the air flow in a canister vacuum cleaner pass through the following components?
    11·1 answer
  • Which type of computer are todays most widely used personal computers?
    8·2 answers
  • What will be the output of the following code snippet? token = False while token : print("Hello")
    11·1 answer
  • There are how many GPS satellites orbiting the earth
    15·1 answer
  • What does the /var directory contain?
    7·1 answer
  • Write a program to compute the sum of digits in a number given by the user. You must use your own function to compute the sum of
    6·1 answer
  • Edhesive 6.3 Code Practice
    15·1 answer
  • A system analyst generally needs to have a number of skills. For example, technical and analytical skills are required for this
    7·1 answer
  • ما هي طرق اختبار الخرسانة <br>​
    14·1 answer
  • What report indicates where users start or exit the conversion funnel?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!