Dr. Alice needs to send patient Bob a prescription electronically. Dr. Alice wants to send the message such that Bob can be sure that the sender of the prescription was in fact Dr. Alice. Dr. Alice decides to encrypt the message as well as include her digital signature. What key will Bob use to be able to decrypt the session key used by Dr. Alice?
Which of the following is an example of an asymmetric key algorithm?
A hospital is setting up a wireless network using ''Wi-Ei'' technology to enable nurses to feed information through it onto the corporate server instead of using traditional paper forms. As a HIPAA security specialist, what would you do as the first step towards, protecting the wireless communication?
Submit Cancel
Currently there are no comments in this discussion, be the first to comment!