CISA Exam-Testing Concept-Asymmetric Encryption (Domain-5)

Nonfiction, Reference & Language, Study Aids, Graduate & Professional, Professional
Cover of the book CISA Exam-Testing Concept-Asymmetric Encryption (Domain-5) by Hemang Doshi, Hemang Doshi
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Hemang Doshi ISBN: 9781370008803
Publisher: Hemang Doshi Publication: October 24, 2016
Imprint: Smashwords Edition Language: English
Author: Hemang Doshi
ISBN: 9781370008803
Publisher: Hemang Doshi
Publication: October 24, 2016
Imprint: Smashwords Edition
Language: English

Point to remember for CISA exam:

(1)In any given scenario, when objective is to ensure ‘confidentiality’, message has to be encrypted using receiver’s public key.

(2)In any given scenario, when objective is to ensure ‘authentication’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.

(3)In any given scenario, when objective is to ensure ‘integrity’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.

(4)In any given scenario, when objective is to ensure ‘confidentiality & authentication’, following treatment is required:

-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation)
-Message to be encrypted using receiver’s public key (to ensure confidentiality)

(5)In any given scenario, when objective is to ensure ‘confidentiality & authentication & integrity’, following treatment is required:

-Message to be encrypted using receiver’s public key (to ensure confidentiality)
-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation and integrity)

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Point to remember for CISA exam:

(1)In any given scenario, when objective is to ensure ‘confidentiality’, message has to be encrypted using receiver’s public key.

(2)In any given scenario, when objective is to ensure ‘authentication’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.

(3)In any given scenario, when objective is to ensure ‘integrity’, HASH of the message has to be created and HASH to be encrypted using sender’s private key. Please note that hash is also known as message digest.

(4)In any given scenario, when objective is to ensure ‘confidentiality & authentication’, following treatment is required:

-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation)
-Message to be encrypted using receiver’s public key (to ensure confidentiality)

(5)In any given scenario, when objective is to ensure ‘confidentiality & authentication & integrity’, following treatment is required:

-Message to be encrypted using receiver’s public key (to ensure confidentiality)
-Hash of the message to be encrypted using sender’s private key (to ensure authentication/non-repudiation and integrity)

More books from Hemang Doshi

Cover of the book CISA EXAM-Testing Concept-Wireless (Wi-Fi) Security by Hemang Doshi
Cover of the book CISA EXAM-Testing Concept-Check Digit,Parity Bit & Atomicity by Hemang Doshi
Cover of the book CISA Exam-Testing Concept-Knowledge of Logical Access Control by Hemang Doshi
Cover of the book CISA Exam-Testing Concept-Backup Schemes (Full/Differential/Incremental) (Domain-4) by Hemang Doshi
Cover of the book CISA Exam-Intrusion Detection System (IDS) & Intrusion Prevention System (IPS)-Domain 5 by Hemang Doshi
Cover of the book CISA Exam-Testing Concept-IT Alignment with Business Objectives by Hemang Doshi
Cover of the book CISA Exam-Testing Concept-Alternate Recovery Site (Hot/Warm/Cold) by Hemang Doshi
Cover of the book CISA Exam-Testing Concept-PERT/CPM/Gantt Chart/FPA/EVA/Timebox (Chapter-3) by Hemang Doshi
Cover of the book CISA EXAM-Testing Concept-Recovery Time Objective (RTO) & Recovery Point Objective (RPO) by Hemang Doshi
Cover of the book CISA EXAM-Testing Concept-Roles of various functions by Hemang Doshi
Cover of the book CISA Exam- Study Guide by Hemang Doshi
Cover of the book CISA Exam-Testing Concept-Classification of Information Assets (Domain-5) by Hemang Doshi
Cover of the book CISA Exam-Testing Concept-Decision Support System (DSS) (Domain-3) by Hemang Doshi
Cover of the book CISA Exam-Testing Concept-Testing in SDLC (Domain-3) by Hemang Doshi
Cover of the book CISA EXAM-Testing Concept-Firewall by Hemang Doshi
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy