Find an application in which a reliable Information Management System is needed. We must collect extremely sensitive information from our consumers and store it in our system. These details are submitted to us in electronic format. Even from ourselves, we must protect our consumers' secrecy; we must not see the information they present to us, otherwise the confidentiality will be jeopardised. As an information security officer, the duty is to double-check the validity of sensitive documents before storing them with the proper users. You have no access to the users' usernames and passwords, which you can save but not recover until the user gives you permission. Second, even though the whole database is compromised or robbed, you must encrypt the passwords and usernames to make it difficult for everyone (including server administrators) besides the users to access them. Which cryptographic mechanisms, based on your knowledge of computer security, would you enforce in order to operate the system as needed, and why? Explain how to use the preferred mechanism.
Find an application in which a reliable
We must collect extremely sensitive information from our consumers and store it in our system. These details are submitted to us in electronic format. Even
from ourselves, we must protect our consumers' secrecy; we must not see the information they present to us, otherwise the confidentiality will be jeopardised. As an
recover until the user gives you permission.
Second, even though the whole
(including server administrators) besides the users to access them.
Which cryptographic
security, would you enforce in order to
Explain how to use the preferred mechanism.
Step by step
Solved in 2 steps