StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Class student dicussions answers - Assignment Example

Cite this document
Summary
The system allows the sender and receiver to share key which is common between them. But I could rather suggest that since symmetric cryptography employs use of same key in both ends of the sender and receiver and…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.3% of users find it useful
Class student dicussions answers
Read Text Preview

Extract of sample "Class student dicussions answers"

discussions answers Good Pavitar for the nice definition of symmetric cryptography. The system allows the sender and receiver to share key which is common between them. But I could rather suggest that since symmetric cryptography employs use of same key in both ends of the sender and receiver and the two parties involved in to exchange the key, makes the system to be insecure in sending sensitive messages. It is not best suited for two organizations which need a secure communication. But else, the symmetric cryptography can be adopted by two different organizations because it can be easily implemented and the organizations need less power for processing the communication.

Pavitor, you could have added a definition and elaborated a bit more of asymmetric cryptography in order to make it easier to differentiate the two concepts. I agree with you Jusin G that symmetric key distribution can pose to bring lots of insecure communication or message interception between the involved organizations. Asymmetric cryptography is also known as public key cryptography. It makes use of two keys, a private key to decrypt messages and a public key to encrypt messages. I agree with you Jusin G that the asymmetric cryptography can be adopted by two organizations which want to send sensitive messages more securely.

This is because; the asymmetric cryptography avoids the drawback of exchanging the key by distribution of the public key in a non-secure mechanism while at the same time, the private key is not transmitted. Thanks Pavitor For the good analysis of the different technologies. But I rather disagree with you that WEP is secure. Let me say that WEP is an older technology in wireless networks. This makes it easily hacked and cannot guarantee security within one’s business premise. You gave the advantage that users shun the network ones it prompts for wireless security key, this is not always the case but depends on an individual’s motif.

User may be determined to think of more other ways of getting into the network. I agree with you about interoperability, it is a great feature provided by the WEP. WPA and WPA2 form part of the recommended solutions to WEP security issues. I agree with you that the stronger encryption and the use of Temporary Key Integrity Protocol (TKIP) which changes dynamically offers more secure means of passing data across a wireless network than WEP. Also to note is that WPA2 was as a result of implementation of 802.11i. Good analysis of the encryption for wireless networks you Pavitor.

I disagree with you Jusin G concerning WEP encryption. Remember that WEP gave rise to WPA, WPA2 and 802i and its creation should never be comprised at all. It is true that the encryption is less secure as compared to its predecessor, WPA and WPA2, but we should be grateful of its creation since it is the basis of the encryptions technologies which followed. Technologists got information about its weakness and improved upon the encryption types which followed. Good analysis though Jusin G.Justin G and Kevin, you have provided a good analysis concerning the transposition cipher.

The vulnerability of the encryption method is correct. Making the cipher writing down in a matrix makes it easier for hackers to get view or access to the transmitted messages. You stated that a Substitution cipher enhances security of the messages but it is also less secure. I further agree with you. The arrangement of bits, characters, or blocks of information makes information to be transmitted more securely. Also to add is that, the cipher can be intercepted by professional hackers who may crack it and get the message to satisfy their needs.

Kevin, you gave an example of pigpen cipher as a kind of substitute ciphers. The illustration is quite good to demonstrate the security potentiality of the cipher type.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Class student dicussions answers Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Class student dicussions answers Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1608415-class-student-dicussions-answers
(Class Student Dicussions Answers Assignment Example | Topics and Well Written Essays - 500 Words)
Class Student Dicussions Answers Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1608415-class-student-dicussions-answers.
“Class Student Dicussions Answers Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1608415-class-student-dicussions-answers.
  • Cited: 0 times

CHECK THESE SAMPLES OF Class student dicussions answers

Cultural Diversification

The students were made to ask other students hard questions and it was observed that done this way, other students were more readily to answer and challenge other answers.... The teacher's only role was to make sure that the discussion does not go off the topic and that the students arrive at the right answers.... The social phenomenon of cultural diversification has resulted to a student population composed of children from different linguistic and cultural background....
3 Pages (750 words) Essay

Instructional presentation

Students will then be more willing to work for answers to higher order questions dealing with the why and how.... econdly, teachers should react to responses in such a way as to encourage student answers.... Incorrect answers based on a lack of knowledge should be met with prompts and hints that may engage the needed information.... If it is important to receive correct answers from individuals, revisiting might prove useful....
2 Pages (500 words) Essay

Importance of Questions and Feedback

). Generally speaking questions are asked for getting answers or information.... In fact according to the modern educational philosophies, the teacher should ask questions to the students and the students should give answers to that.... When the student fails to answer the question, the teacher should guide him to find out the answer.... Initial questions should be easy so that the student may answer it easily.... Only in such an unknown situation, the students develop interest or curiosity in the topic and will attend the class properly....
4 Pages (1000 words) Assignment

Taking Online Class is a Sociological Event

Some important questions that rose among theorists about online classes were “Which student in terms of race and ethnicity is prone to online education” “What are the forces that drive offline and online classes” “What are the outcomes from online classes both social and educational” “For a complete study in a online class what are the additional research strategies”.... This essay deals with the different principles and concepts involved with online class....
6 Pages (1500 words) Essay

2nd grade math lesson plan

The discussion sessions enables the students to analyze the path to answers, in line with the instructions of the teacher.... The learning target and also environment is student friendly.... The students are given questions, and then through class discussions the pathways to the solutions are discussed (Alphonso, 2013)....
4 Pages (1000 words) Assignment

Peer Assessment Experience

Every student was assigned a paper to mark, and the tutor would guide us through the marking of the papers.... The assessment came as an encouragement to the not-so-good students that they can be trusted to assess even the brightest students in our class.... The essay "Peer assessment " enables my classmates and me to improve our social skills....
6 Pages (1500 words) Essay

A Teaching Focus Area

From the paper "A Teaching Focus Area" it is clear that in the Constructivist theory the emphasis is placed on the learner or the student rather than the teacher or the instructor.... hellip; Observing the class in action has provided much learning to the observers.... bservations were done in a Year 8 science class.... The class was studying a unit on Magnetism and the class session observed is a continuation of discussions on the topic from the day before....
8 Pages (2000 words) Coursework

Demystification of Social Media as a Learning Avenue and Source of Education

The paper "Demystification of Social Media as a Learning Avenue and Source of Education" proposes the plan is to guide the student to realize the effects of social media.... hellip; As a tutor, I would walk around to get their feel of the subject, answering their questions in the groups around the classroom 8:50-8:55- Question and answer sessions as I give the students quick questions on 8:00-8:10-gauge how much the students know about social media by asking them questions on what each student knows in brief....
7 Pages (1750 words) Research Proposal
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us