Please consider offering answers and suggestions to help other students!
And if you fix a problem by following a suggestion here,
it would be great if other interested students could see a short
"Great, fixed it!" followup message.
How do I ask a good question?
Displaying selected article
Showing 1 of 503 articles.
Currently 41 other people reading this forum.
Hi could I check my answer to this question
The ISO/OSI networking group defined six distinct software mechanisms forming their ISO/OSI Security Architecture. Unfortunately, none of the ISO/OSI Security Architecture recommendations are supported by the core protocols of the TCP/IP internetworking suite. Briefly describe the recommended security mechanisms, and describe how the use of the TCP/IP protocol suite is slowly evolving to address the ISO/OSI recommendations.
...
The TCP/IP suite evolved to address these 6 recommendations (i.e. data confidentiality, integrity...) by incorporating the following security measures:
- Encryption (such as SHA or RSA) to transform the data into a form that is not readily intelligible and only decryptable by the intended parties (i.e. those who have the key).
- Digital Signatures and Message Digests to verify the authenticity of messages, giving the recipient confidence that the message came from a sender known to the recipient
- Digital Certificates to verify the authenticity of a public key. A certificate authority, organised into hierarchies of trust, attests to authenticity by signing a message with its own private key