Which of the following would best describe a Concealment cipher?
When a concealment cipher is used, every X number of words within a text, is a part of the real message. The message is within another message.
A concealment cipher is a message within a message. If my other super-secret spy buddy and I decide our key value is every third word, then when I get a message from him, I will pick out every third word and write it down. Suppose he sends me a message that reads, ''The saying, 'The time is right' is not cow language, so is now a dead subject.'' Because my key is every third word, I come up with ''The right cow is dead.'' This again means nothing to me, and I am now turning in my decoder ring.
Concealment ciphers include the plaintext within the ciphertext. It is up to the recipient to know which letters or symbols to exclude from the ciphertext in order to yield the plaintext. Here is an example of a concealment cipher:
i2l32i5321k34e1245ch456oc12ol234at567e
Remove all the numbers, and you'll have i like chocolate. How about this one?
Larry even appears very excited. No one worries.
The first letter from each word reveals the message leave now. Both are easy, indeed, but many people have crafted more ingenious ways of concealing the messages. By the way, this type of cipher doesn't even need ciphertext, such as that in the above examples.
Consider the invisible drying ink that kids use to send secret messages. In a more extreme example, a man named Histiaeus, during 5th century B.C., shaved the head of a trusted slave, then tattooed the message onto his bald head. When the slave's hair grew back, Histiaeus sent the slave to the message's intended recipient, Aristagoros, who shaved the slave's head and read the message instructing him to revolt.
The following answers are incorrect:
A transposition cipher uses permutations.
A substitution cipher replaces bits, characters, or blocks of characters with different bits, characters or blocks.
Steganography refers to hiding the very existence of the message.
Source: WALLHOFF, John, CBK#5 Cryptography (CISSP Study Guide), April 2002 (page 1).
and also see:
http://www.go4expert.com/forums/showthread.php?t=415
The MOST common threat that impacts a business's ability to function normally is:
The MOST common threat that impacts a business's ability to function normally is power. Power interruption cause more business interruption than any other type of event.
The second most common threat is Water such as flood, water damage from broken pipe, leaky roof, etc...
Threats will be discovered while doing your Threats and Risk Assessments (TRA).
There are three elements of risks: threats, assets, and mitigating factors (countermeasures, safeguards, controls).
A threat is an event or situation that if it occured would affect your business and may even prevent it from functioning normally or in some case functioning at all. Evaluation of threats is done by looking at Likelihood and Impact of possible threat. Safeguards, countermeasures, and controls would be used to bring the threat level down to an acceptable level.
Other common events that can impact a company are:
Weather, cable cuts, fires, labor disputes, transportation mishaps, hardware failure, chemical spills, sabotage.
References:
The Official ISC2 Guide to the CISSP CBK, Second Edition, Page 275-276
Which common backup method is the fastest on a daily basis?
The incremental backup method only copies files that have been recently changed or added. Only files with their archive bit set are backed up. This method is fast and uses less tape space but has some inherent vulnerabilities, one being that all incremental backups need to be available and restored from the date of the last full backup to the desired date should a restore be needed.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, John Wiley & Sons, 2001, Chapter 3: Telecommunications and Network Security (page 69).
Which of the following is more suitable for a hardware implementation?
A stream cipher treats the message as a stream of bits or bytes and performs mathematical functions on them individually. The key is a random value input into the stream cipher, which it uses to ensure the randomness of the keystream data. They are more suitable for hardware implementations, because they encrypt and decrypt one bit at a time. They are intensive because each bit must be manipulated, which works better at the silicon level. Block ciphers operate a the block level, dividing the message into blocks of bits. Cipher Block chaining (CBC) and Electronic Code Book (ECB) are operation modes of DES, a block encryption algorithm.
Source: WALLHOFF, John, CBK#5 Cryptography (CISSP Study Guide), April 2002 (page 2).
External consistency ensures that the data stored in the database is:
External consistency ensures that the data stored in the database is consistent with the real world.
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, page 33.
Shonda
3 days agoErasmo
11 days agoSvetlana
19 days agoCoral
26 days agoBen
1 month agoEmelda
1 month agoAlise
2 months agoGilma
2 months agoCarline
2 months agoSharen
2 months agoBernadine
3 months agoAlayna
3 months agoLavina
3 months agoMendy
3 months agoPa
4 months agoNorah
4 months agoNikita
4 months agoMammie
4 months agoRaina
5 months agoEvangelina
5 months agoDelila
5 months agoMireya
5 months agoLindsey
6 months agoRenato
6 months agoKaycee
6 months agoLucina
8 months agoAnglea
8 months agoJoesph
9 months agoMammie
10 months agoAlisha
11 months agoBo
11 months agoEve
12 months agoParis
1 year agoVesta
1 year agoMing
1 year agoBok
1 year agoMaryann
1 year agoValentine
1 year agoKeshia
1 year agoSocorro
1 year agoMonte
1 year agoHan
1 year agoDelbert
1 year agoGerri
1 year agoLawanda
1 year agoDalene
1 year agoScarlet
1 year agoLavonda
1 year agoJunita
1 year agoCherry
1 year agoColette
1 year agoNohemi
1 year agoHubert
1 year agoDalene
1 year agoMertie
1 year agoMicah
1 year agoKayleigh
1 year agoAretha
1 year agoAlita
2 years agoEun
2 years agoShannon
2 years agoNettie
2 years ago