Answer:
a) Generate a new public and private key
Explanation:
You encrypt a message using the recipient's public key and the recipient decrypts the message using his own private key. Only the public key can be known by an external agent. The private key is for the individual and is not expected to be shared. In the event that the recipient cannot decrypt the message, it is unsafe to send one's private key to him. He does not even need one's private key to decrypt the message, he needs his own private key.
The best thing to do is to generate another means of security by generating new public and private key so that the sender encrypts the message with the new public key and the receiver decrypts it using his new private key.
Option B is wrong because, if the encryption is removed, the aim, which is to secure the message from intruders is not achieved.
Answer:
Explanation:
The following Python code asks the user for inputs for the name to remove and add in the set. It then tries to remove the given name from the list. If it fails it prints out to the user saying that the name does not exist. If it does exist then it removes the name and adds the new name. Finally it prints out the current list of names.
male_names = {'oliver', 'Declan', 'Henry'}
name_to_remove = input("Enter name to remove: ")
name_to_add = input("Enter name to add: ")
try:
male_names.remove(name_to_remove)
male_names.add(name_to_add)
except:
print("Name that you are trying to remove does not exist")
print("List of Names: ")
print(male_names)
Answer:
Least Privilege
Explanation:
The principle of least privilege an important principle in computer security. It is the practice of limiting access rights for users to the basic minimum or least amount of privilege they require to perform their tasks. For example a user is granted privilege to execute a file or manipulate data or use resources they require to perform a function or task. Therefore, this principle can be used only to limit access rights for programs, systems, and devices to those permissions only that are required to carry out permitted activities. Conforming to principle of least privilege reduces the risk of hackers gaining access to sensitive information or a system, by compromising a user account or device. For example an individual whose task is to enter data into a database only requires option to add records to that DB by the principle of least privilege. If a virus attacks the computer of that individual, this attack is restricted only to creating DB entries.
Answer:
1. Port - Segment
2. MAC ID - Frame
3. IP address - Packet
Explanation:
Happy December to all!! :)