Describe the crypto dilemma
Part II Q1-3
QII.1 For a public-key encryption system, list reasons,
1. in favor of and
for using the same key pair for encryption and the digital signature
1. Describe “inference controls.”
2. Give reasons why they are needed.
3. And give specific examples (at least 3), and describe how the inference controls are implemented; how they serve the purpose (effective) in a database.
1. Describe the “crypto dilemma.”
2. Suggest 3 ways to address the “crypto dilemma.”
3. State the pros and cons of each way.
Part 3: Essay Question. Maximum length: 900 words, double spaced 12 point font.
Please no copying and pasting and plagiarism.
An enterprising group of entrepreneurs is starting a new data storage and retrieval business, AcmeStore, Inc. For a fee, the new company will accept digitalized data (text and images, multimedia), and store it on hard drives until needed by the customer. Customer data will be transmitted to and from AcmeStore over the Internet. AcmeStore guarantees that the data’s confidentiality and integrity will be maintained.
AcmeStore also envisions some information assurance requirements for their internal operations. Company employees will need to exchange confidential email, and will need a mechanism for verifying the integrity and originator of some email messages. Also, AcmeStore intends a daily backup of all customer data to a remote facility via a leased line. They wish to do so as economically as possible, while ensuring the data’s confidentiality and integrity.
AcmeStore is interviewing candidates for the position of Chief Information Officer (CIO). They are asking candidates to describe briefly how they would satisfy AcmeStore’s requirements as stated above. How would a successful candidate respond?