.

Thursday, April 25, 2019

Class student dicussions answers Assignment Example | Topics and Well Written Essays - 500 words

Class student dicussions answers - Assignment ExamplePavitor, you could have added a definition and elaborated a bit more of unsymmetric coding in order to get in it easier to differentiate the two concepts. I agree with you Jusin G that symmetric pigment distribution can cling to bring lots of insecure communication or message interception between the involved organizations. Asymmetric cryptogram is also known as public key cryptography. It makes use of two keys, a private key to decrypt messages and a public key to encrypt messages. I agree with you Jusin G that the asymmetric cryptography can be adopted by two organizations which want to send sensitive messages more securely. This is because the asymmetric cryptography avoids the drawback of exchanging the key by distribution of the public key in a non-secure mechanism composition at the same time, the private key is not transmitted.Thanks Pavitor For the good analysis of the different technologies. still I rather disagree with you that WEP is secure. Let me say that WEP is an older technology in tuner networks. This makes it good hacked and cannot guarantee security within ones business premise. You gave the advantage that users shun the network ones it prompts for wireless security key, this is not always the case but depends on an individuals motif. User may be determined to think of more other ways of getting into the network. I agree with you about interoperability, it is a great feature provided by the WEP.WPA and WPA2 form part of the recommended solutions to WEP security issues. I agree with you that the stronger encryption and the use of Temporary Key Integrity Protocol (TKIP) which changes dynamically offers more secure means of transition data across a wireless network than WEP. Also to note is that WPA2 was as a end of implementation of 802.11i. Good analysis of the encryption for wireless networks you Pavitor.I disagree with you Jusin G

No comments:

Post a Comment