Which technique is to ensure the confidentiality of a message?
Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. Show
Message authentication allows VTAM® to determine if a message has been altered in transmission between the session partners. A code is attached to each message by the sender and verified by the session partner. There are two methods for producing the message authentication code:
The APPL definition statement and MODEENT macroinstruction provide operands that you can use to define the message authentication support to be provided for a session. Code the following operands for each end of the session:MACSpecifies whether authentication of data sent and received by the LU is required, conditional, or not supported.MACLNTHSpecifies the minimum length of the message authentication code attached to the message.MACTYPESpecifies the type of message authentication checking (DES or CRC) to be used for the session. See z/OS Communications Server: SNA Resource Definition Reference for information about how to code the preceding operands. There are ways to protect personal information while still enjoying much of what the Web has to offer
So many of the Web’s most popular services—e-mail and search as well as photo and video sharing—may be free, but that doesn’t mean they come without a cost. That price is information about the people using those services as well as their online behavior—intelligence that Facebook, Google, Microsoft and other Internet companies exchange for advertising revenue. The trade-off of privacy for free services is generally acceptable to most Web users, who are used to incessant advertising—and at times even benefit from personalized attempts to sell them products and services. ABOUT THE AUTHOR(S)Larry Greenemeier is the associate editor of technology for Scientific American, covering a variety of tech-related topics, including biotech, computers, military tech, nanotech and robots. Follow Larry Greenemeier on Twitter Credit: Nick Higgins Recent Articles by Larry Greenemeier
Technology and the Emerging Post-Privacy EraThe Sciences Steve Mirsky Policy Larry Greenemeier Larry Greenemeier Policy Larry Greenemeier Technology Larry Greenemeier Technology Jim Nash Which technique is used to ensure confidentiality?Data encryption is a common method of ensuring confidentiality. User IDs and passwords constitute a standard procedure; two-factor authentication is becoming the norm. Other options include biometric verification and security tokens, key fobs or soft tokens.
What is the best approach to protecting the confidentiality of the message?By encrypting only the confidential parts of a message, we can enhance the performance of a solution without compromising on security. Selective encryption also helps if parts of a message need to be kept in plain text for reasons beyond our control.
What is confidentiality of a message?Message confidentiality means that the message being sent is only known by the sender and the recipient. This differs from message integrity, which means that a message is not tampered with and that the sender and recipient are exactly who they say they are.
|