Q.3.1.1 The statements below are the text version of the illustrated steps (step one to step five in the diagram above). Read each statement (step) and then correct all that is false. These are the steps for Bob to send a digitally signed message to Alice: Step Number Statement 1 After creating a memo, Alice generates a hash on it. 2 Bob then encrypts the hash with a public key. This encryption is a digital signature of the hash. 3 Bob only sends the digital signature to Alice. 4 When Alice receives them, she describes the digital signature using Bob’s public key, revealing the hash. 5 Alice then hashes the memo with the different hash algorithms Bob used and compares the result to the hash she received from Bob. (6) 19; 20; 21 2021 © The Independent Institute of Education (Pty) Ltd 2021 Page 5 of 6 You have verified that the correct keys have been used either encrypting and/or decrypting the digital signatures as well as the correct has algorithm is used to hash the memo. Explain the implications of the following scenarios: Q.3.1.2 If Alice could not decrypt the digital signature. (2) Q.3.1.3 If, after Alice hashing the memo, the hashes are not equal. (2)

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Study the diagram below showing the steps for Bob to send a digitally signed message
to Alice and then answer the questions that follow:
Q.3.1.1 The statements below are the text version of the illustrated steps
(step one to step five in the diagram above).
Read each statement (step) and then correct all that is false.
These are the steps for Bob to send a digitally signed message to
Alice:
Step
Number
Statement
1 After creating a memo, Alice generates a hash on it.
2 Bob then encrypts the hash with a public key. This
encryption is a digital signature of the hash.
3 Bob only sends the digital signature to Alice.
4 When Alice receives them, she describes the digital
signature using Bob’s public key, revealing the hash.
5 Alice then hashes the memo with the different hash
algorithms Bob used and compares the result to the
hash she received from Bob.
(6)
19; 20; 21 2021
© The Independent Institute of Education (Pty) Ltd 2021
Page 5 of 6
You have verified that the correct keys have been used either encrypting and/or
decrypting the digital signatures as well as the correct has algorithm is used to hash
the memo.
Explain the implications of the following scenarios:
Q.3.1.2 If Alice could not decrypt the digital signature. (2)
Q.3.1.3 If, after Alice hashing the memo, the hashes are not equal. (2)
Q.3.2 Using a plausible example differentiate between cryptography and encryption. (5)
Q.3.3 Read the scenario below and then answer the following questions regarding
wireless and mobile security.
Nonhlanhla wants to have wireless access in the employee break room and
conference room next to her office. However, her employer’s IT staff turns
down her request for a wireless network. Nonhlanhla decides to take the
matter into her own hands: she purchases an inexpensive consumer
wireless router and secretly brings into her office and connects it to the
wired network, thus providing wireless access to the employees in her area.
Q.3.3.1 Name the type of Access Point (AP) that has been installed by
Nonhlanhla.
Provide a reason for your answer.
(5)
Q.3.3.2 List any two tools that you could use to detect what Nonhlanhla has
secretly installed.
(4)
Q.3.3.3 Staff members in Nonhlanhla’s area have a Bring Your Own Device
(BYOD) agreement and setup. These members do bring laptops,
smartphones, and tablets to perform the organisation’s duties.
Use a suitable example to explain how mobile device management
can enforce geofencing to secure mobile device apps from
unauthorised access to the network.

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY