Callback or dial-back systems and magnetic cards with personal identification numbers provide medium protection, whereas user identification numbers and passwords provide minimum protection. Callback systems can be negated through the use of call forwarding features in a telephone system. Magnetic cards can be lost, stolen, or counterfeited. User IDs and passwords can be shared with others or guessed by others, a control weakness.
170. To achieve effective security over transmission, what is the best area where stronger encryption can be applied the most?
a. Packet level
b. Record level
c. File level
d. Field level
171. What is the
a. Scrambling the data
b. Encoding the data before transmission
c. Decoding the data after transmission
d. Using passwords and other identification codes
172. What is the
a. Dial-back technique
b. Dial-forward technique
c. File encryption only
d. Dial-back combined with data encryption
Encryption can be adapted as a means of remote user authorization. A user key, entered at the keyboard, authenticates the user. A second encryption key can be stored in encrypted form in the calling system firmware that authenticates the calling system as an approved communications endpoint. When dial-back is used with two-key encryption, data access can be restricted to authorized users (with the user key) with authorized systems (those whose modems have the correct second key), located at authorized locations (those with phone numbers listed in the answering system’s phone directory).
Dial-back technique alone cannot guarantee protection against masquerading because hackers can use the dial-forward technique to reroute calls and spoof the connection. File encryption only may not be adequate because an intruder may have an opportunity to intercept the key while it is in transit. Managing the encryption key is critical.
173. Which of the following describes message authentication correctly?
a. A process of guaranteeing that the message was sent as received by the party identified in the header of the message.
b. A process of guaranteeing that the message was sent as received by the party identified in the footer of the message.
c. A process of guaranteeing that the message sent was received at the same time regardless of the location.
d. A process of guaranteeing that all delivered and undelivered messages are reconciled immediately.