IA Concepts
IA Concepts
What are the inputs and output of the GSM authentication function A3?
Vulnerability Vs Security
A vulnerability is a weakness in the system that might be exploited to cause loss or harm. In
computer security,
a threat is a possible danger that might exploit a vulnerability to breach security and therefore
cause possible harm.
UE 2016 qn3
Identify seven mandatory field in X.509v3 digital certificates and describe the purpose of each
field
Explain the PGP (UE 2017 qn4 )
PGP (Pretty Good Privacy)
Implements all major cryptographic algorithms, the ZIP compression algorithms, and the
Base64 encoding algorithm
•Can be used to authenticate or encrypt a message, or both
•General format:
–Authentication
–ZIP compression
–Encryption
–Base64 encoding (for SMTP transmission)