Author: | Hemang Doshi | ISBN: | 9781370008803 |
Publisher: | Hemang Doshi | Publication: | October 24, 2016 |
Imprint: | Smashwords Edition | Language: | English |
Author: | Hemang Doshi |
ISBN: | 9781370008803 |
Publisher: | Hemang Doshi |
Publication: | October 24, 2016 |
Imprint: | Smashwords Edition |
Language: | English |
Point to remember for CISA exam:
(1)In any given scenario, when objective is to ensure ‘confidentiality’, message has to be encrypted using receiver’s public key.
(2)In any given scenario, when objective is to ensure ‘authentication’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.
(3)In any given scenario, when objective is to ensure ‘integrity’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.
(4)In any given scenario, when objective is to ensure ‘confidentiality & authentication’, following treatment is required:
-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation)
-Message to be encrypted using receiver’s public key (to ensure confidentiality)
(5)In any given scenario, when objective is to ensure ‘confidentiality & authentication & integrity’, following treatment is required:
-Message to be encrypted using receiver’s public key (to ensure confidentiality)
-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation and integrity)
Point to remember for CISA exam:
(1)In any given scenario, when objective is to ensure ‘confidentiality’, message has to be encrypted using receiver’s public key.
(2)In any given scenario, when objective is to ensure ‘authentication’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.
(3)In any given scenario, when objective is to ensure ‘integrity’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.
(4)In any given scenario, when objective is to ensure ‘confidentiality & authentication’, following treatment is required:
-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation)
-Message to be encrypted using receiver’s public key (to ensure confidentiality)
(5)In any given scenario, when objective is to ensure ‘confidentiality & authentication & integrity’, following treatment is required:
-Message to be encrypted using receiver’s public key (to ensure confidentiality)
-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation and integrity)