Which of the following is a technique used for modifying messages…?

Computer networks and the Internet are the prime mode of Information transfer today. Which of
the following is a technique used for modifying messages, providing Information and Cyber security,
and reducing the risk of hacking attacks during communications and message passing over the
Internet?

Computer networks and the Internet are the prime mode of Information transfer today. Which of
the following is a technique used for modifying messages, providing Information and Cyber security,
and reducing the risk of hacking attacks during communications and message passing over the
Internet?

A.
Risk analysis

B.
Firewall security

C.
Cryptography

D.
OODA loop

Explanation:
Cryptography is responsible for the encoding of messages and securing messages
during a network communication. Cryptography is a
technique of encrypting and decrypting messages. When the text is encrypted, it is unreadable by
humans. When the text is decrypted, it is
readable by the humans. The terms used in cryptography are as follows:
Plaintext: This text can be read by a user.
Ciphertext: This text can be converted to a non-readable format.

Encryption: It is the process of creating a ciphertext from a plaintext.
Decryption: It is the process of converting a ciphertext to a plaintext.
Cipher: It is an algorithm that is used to encrypt and decrypt text.
Key: Keys are the elements that are used in the technology of encrypting and decrypting text.
Answer option A is incorrect. Risk analysis is the science of risks and their probability and evaluation
in a business or a process. It is an
important factor in security enhancement and prevention in a system. Risk analysis should be
performed as part of the risk management
process for each project. The outcome of the risk analysis would be the creation or review of the risk
register to identify and quantify risk
elements to the project and their potential impact.
Answer option D is incorrect. The OODA loop (for observe, orient, decide, and act) is a concept
originally applied to the combat operations
process, often at the strategic level in both military and business operations. It is now also often
applied to understand commercial operations
and learning processes. The concept was developed by military strategist and USAF Colonel John
Boyd.



Leave a Reply 0

Your email address will not be published. Required fields are marked *