Cryptography Exercise
Essay Preview: Cryptography Exercise
Report this essay
2. Financial Loss – the cost of computers and hardware
The loss of data and information – companies may store employees and customers information on their databases on the computers.
Lawsuits/ Legal action – the company may suffer legal action and scrutiny from customers because of the sensitive data loss.
3. Confidentiality and integrity is at risk.
The company will have a lack of customers (they wont trust the company anymore)
Blackmailing can occur.
4. Data vulnerabilities
Programs and data can be altered by the attacker which can lead to the inability to function
5. Example 1 – a vehicles software can be edited and/or changed by using a laptop wirelessly or by plugging it into a USB port. However, most vehicle software is enhanced so that few security attacks can take place.
8. Software controls can be implemented for example internal program controls. This means that parts of certain programs enforces security restrictions. Restrictions can also be placed upon the operating system. This feature enforced by the operating system is to protect the user from all other users on the same network.
Encryption and special logins are used to block out certain users and disable them from seeing any information not meant for them.
9. Electronic spy – is a person or a gadget placed by a person on a network infrastructure or computer network to gather specified information.
Information broker – can be a person or a company that searches specified information for its clients/ customers.