Question: A brief explanation regarding the following issues : Key distribution schemes using an access control center and/or a key distribution center have central points vulnerable
A brief explanation regarding the following issues:
- Key distribution schemes using an access control center and/or a key distribution center have central points vulnerable to attack. Discuss the security implications of such centralization.
- What methods/facilities are available to secure data in today's systems? Have these methods proved to be adequate? If not, what changes would you recommend to make these methods more secure?
- You are asked to design a security system for a company to ensure data protection according to the CIA triad. Discuss how you would go about beginning such an assignment and then explain what your final design should accomplish. Keep in mind cost as an issue.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
