Computers and Technology

Charlie was getting ready to head home when the phone rang- Caller ID showed it was Peter- "Hi, Peter," Charlie said into the receiver- "Want me to start the file cracker on your spreadsheet" "No, thanks," Peter answered, taking the joke well- "I remembered my passphrase- But I want to get your advice on what we need to do to make the use of encryption more effective and to get it properly licensed for the whole company- I see the value in using it for certain kinds of information, but I'm worried about forgetting a passphrase again, or even worse, that someone else forgets a passphrase or leaves the company- How would we get their files back" "We need to use a feature called key recovery, which is usually part of PKI software," said Charlie- "Actually, if we invest in PKI software, we could solve that problem as well as several others-" "OK," said Peter- "Can you see me tomorrow at 10 o'clock to talk about this PKI solution and how we can make better use of encryption"
a- Was Charlie exaggerating when he gave Peter an estimate for the time required to crack the encryption key using a brute force attack?
b- Are there any tools that someone like Peter could use safely, other than a PKI-based system that implements key recovery, to avoid losing his passphrase? Suppose Charlie had installed key logger software on all company computer systems and had made a copy of Peter's encryption key- Suppose that Charlie had this done without policy authority and without anyone's knowledge, including Peter's-
c- Would the use of such a tool be an ethical violation on Charlie's part? Is it illegal? Suppose that Charlie had implemented the key logger with the knowledge and approval of senior company executives, and that every employee had signed a release that acknowledged the company can record all information entered on company systems- Two days after Peter's call, Charlie calls back to give Peter his key: "We got lucky and cracked it early-" Charlie says this to preserve Peter's illusion of privacy-
d- Is such a "little white lie" an ethical action on Charlie's part?

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 21.06.2019 15:00, vdkgknsdg9996
Much has been made of the new web 2.0 phenomenon, including social networking sites and user-created mash-ups. how does web 2.0 change security for the internet? how do secure software development concepts support protecting applications?
Answers: 1
image
Computers and Technology, 22.06.2019 20:00, jroy1973
Awide variety of “ apps “ are available to customize devices. which category of app does the word processing software fall into?
Answers: 2
image
Computers and Technology, 23.06.2019 04:31, mona92
Which of the following is not a way in which trees benefit the environment? a. they remove a significant amount of carbon dioxide from the atmosphere. b. they remove a significant amount of oxygen from the atmosphere. c. their roots hold soil in place, reducing rates of erosion. d. they remove ozone and particulates from the atmosphere. select the best answer from the choices provided a b c d
Answers: 1
image
Computers and Technology, 23.06.2019 07:50, kmart4062
Apython programming question: assume s is a string of lower case characters. write a program that prints the number of times the string 'bob' occurs in s. for example, if s = 'azcbobobegghakl', then your program should print number of times bob occurs is: 2
Answers: 3
Do you know the correct answer?
Charlie was getting ready to head home when the phone rang- Caller ID showed it was Peter- "Hi, Pete...

Questions in other subjects:

Konu
Mathematics, 13.10.2020 22:01
Konu
Mathematics, 13.10.2020 22:01
Konu
Mathematics, 13.10.2020 22:01