logo

Introduction to Information Assurance and Information Security Assignment 2022

   

Added on  2022-10-11

11 Pages1301 Words11 Views
Introduction to
information
assurance and
information security
Symmetrical versus public
key.

1. Introduction:
The following presentation illustrates the following:
Comparing security mechanisms
Explaining the essence of “public key cryptography”
The short historical backstory related to the process of development
of innovation of encryption
Different utilizations of the public-key cryptography
Analysis of public versus symmetrical key
Demonstrating the technology of encryption along with
understanding different ways it is related to the e-mail, secure web
access, network traffic and storage.

2. Comparing different security
mechanisms:
MPLS-TEMPLS-TE: It is a traffic engineering approach providing quicker and securing data
traffic on the network.
Access ControlWMN: It uses access control mechanisms from the prior wireless network like
MANET, -hoc network and 802.11 (Zhang et al., 2015).
SSL VPN: It is a kind of virtual private network using Secure Socket Layer protocol and
frequently the TLS or Transport Layer protocol. It permits the remote users in accessing client-
server applications, web applications, and internal network connections despite any need to
install particular client software over the systems (Shiu, Chen & Hong, 2015).

3. Evaluating the “public key
cryptography”:
This overall process of the
cryptography is seen to require a
couple of distinct keys. At this place,
one has been secret or private and
the another one remains public.
Besides, it blitzes different keys for
encrypting and decrypting data for
protecting that against unauthorized
use or access (Bellare & Dai, 2017).
Further, the users of network get the
pair of private and public key from
the authorities of certifications. As
one user need to encrypt the
information, they gain the expected
public key of the recipients from
public directory.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Networking Concepts
|5
|897
|471

Hybrid Encryption
|4
|798
|8

Question 1: Data Encryption Standards for WiMAX
|6
|1264
|236

Cryptography Algorithm
|11
|2443
|35

Secure Encryption Technologies: A Comprehensive Guide
|15
|586
|240

Wireless network Concepts Assignment
|11
|2890
|43