• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Security Architecture

MIS 5214 - Section 001 - David Lanter

Security Architecture

MIS 5214.001 ■ Spring 2024 ■ David Lanter
  • Homepage
  • Instructor
  • Syllabus
  • Deliverables
    • Assignments
    • Case Studies
      • Case Study 1 – A High Performance Computing Cluster Under Attack: The Titan Incident
      • Case Study 2 – Data Breach at Equifax
    • Participation
    • Team Project
  • Harvard Coursepack

My question to discuss with my classmates

January 31, 2024 by David Lanter 14 Comments

Filed Under: 04 - Cryptography Tagged With:

Reader Interactions

Comments

  1. Eyup Aslanbay says

    February 4, 2024 at 5:33 pm

    What is the purpose of Diffie–Hellman key exchange?

    Log in to Reply
    • Celinemary Turner says

      February 6, 2024 at 9:52 pm

      Diffie-Hellman key exchange protocol is crucial in enabling secure communication over insecure channels by establishing a shared secret key between parties while mitigating the risk of eavesdropping and interception.

      Log in to Reply
  2. Yannick Rugamba says

    February 4, 2024 at 7:36 pm

    With so many data breaches today, what do you think is more important – the right to strong encryption for privacy, or access for police to catch criminals? Why?

    Log in to Reply
    • Eyup Aslanbay says

      February 6, 2024 at 8:02 pm

      The debate between strong encryption for privacy and police access to data is like a balancing act. On one hand, we need strong encryption to keep our personal and business information safe from hackers and to protect our freedom to talk and share things privately. On the other hand, police need to get into some encrypted data to stop bad things like terrorism and to solve serious crimes. It’s tricky because if we make a special key for police to access encrypted data, it might also make it easier for bad people to break in. We need to find a middle way where our private information stays safe, but police can also do their job in very serious situations. This means making smart rules, finding new technology solutions, and countries working together to solve this puzzle.

      Log in to Reply
  3. Jon Stillwagon says

    February 4, 2024 at 8:03 pm

    Is it safe to use cryptography to send passwords to people that are having trouble getting into their system?

    Log in to Reply
    • Eyup Aslanbay says

      February 6, 2024 at 8:05 pm

      Sending passwords with cryptography, or secret coding, can be safe. Use strong encryption and share the password through a secure method like encrypted email or a secure app. The password should be complex and changed as soon as the person gets into their system. Avoid regular emails or texts, as they’re not very safe. Using temporary passwords that only work once can also help keep things secure.

      Log in to Reply
      • Jon Stillwagon says

        February 6, 2024 at 8:25 pm

        Eyup,
        That’s interesting I know it may be inefficient in my opinion having to decrypt a message just to get a code to implement it and go through the logging in process. What do you think about it?

        Log in to Reply
  4. Celinemary Turner says

    February 4, 2024 at 8:11 pm

    In public key encryption for authentication, which key does the supplicant use to encrypt?

    Log in to Reply
    • Eyup Aslanbay says

      February 6, 2024 at 8:11 pm

      In public key encryption for proving who you are, the person (supplicant) uses their own secret key, called a private key, to encrypt the information. This means they lock the information using a key that only they have. The other side then uses a matching public key, which is like a special code that can open the lock, to check the information.

      Log in to Reply
  5. Edge Kroll says

    February 4, 2024 at 11:04 pm

    What role do key pairs, such as those in RSA, play in ensuring confidentiality?

    Log in to Reply
    • Eyup Aslanbay says

      February 6, 2024 at 8:14 pm

      In RSA encryption, key pairs ensure confidentiality like this: There’s a public key, which is shared with everyone and used to encrypt (lock) information, and a private key, which is kept secret and used to decrypt (unlock) that information. Only the person with the private key can unlock and read what was sent, keeping it safe and private.

      Log in to Reply
  6. Bo Wang says

    February 4, 2024 at 11:16 pm

    People’s Daily use of passwords will have some similarities, how to avoid this situation.

    Log in to Reply
    • Jon Stillwagon says

      February 6, 2024 at 8:27 pm

      I would think that changing passwords frequently within the organization may be the solution. If people keep changing their passwords it would keep the pool fresh and be able to defend off of any people that try dictionaries. So they can get into their system to cause harm.

      Log in to Reply
  7. Ooreofeoluwa Koyejo says

    February 4, 2024 at 11:24 pm

    If hashing is an irreversible function, are there limitations to its use and applicability?

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • 01 – Introduction (1)
  • 01 – Threat Environment (3)
  • 02 – System Security Plan (6)
  • 03 – Planning and Policy (7)
  • 04 – Cryptography (4)
  • 05 – Secure Networks (7)
  • 06 – Firewalls (5)
  • 08 – Access Control (7)
  • 09 – Host Hardening (5)
  • 10 – Application Security (6)
  • 11 – Data Protection (4)
  • 12 – Incident and Disaster Response (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in