University of Nairobi Deployment Model Response Need 2 Responses to other students initial posts
Instructions:
Need 2 Responses (Please see uploaded document to see other student posts)
Need minimum 250 words for each response
Need 2 APA References for each response (Please make sure to use 2015 and above sources)
In Responses Please state why you agree (or not) with your peers.
Consider other deployment models (including combined models) that might be more appropriate for that type of business. Initial Post 1:
In every endeavor within the prospect of communication, it is ostensibly accurate to argue that the
parameters revolving around security as well as efficiency are of intrinsic value. In every regard,
it is understandable that the ideal reason behind the existence of the attribute of authentication is
ascertainment of the provision of the users with reliable credentials. These could comprise of
password, alongside username. Such facets could demand that available users verify through the
provision of appropriate credentials as and when they desire to access prevailing applications
(Sato, 2015).
A significant proportion of practitioners understands the need for them to involve
themselves with the undertaking of storing existing credentials for usage during futuristic stances.
Even though such engagement is necessary, it is presumable that the storage of passwords on
servers for the intention of authentication could be a somehow problematic engagement. The paper
inclines to highlight the hashing security-oriented mechanism along with the possible association
which it has with the encryption-affiliated mechanism.
Hashing security-affiliated, within its regard, is expressible as an inherent cryptographic
attribute whose ideal responsibility involves the transformation of available data set into another
whose length is fixed through the exploitation of mathematical procedures (Walker, & Mackey,
2017). During this manifestation, the attribute positions itself by mapping the accessible data of
any given size and thus changing it to a fixed length by the integration of the hash table which is
subject to preceded by the storage of the output data within the digest.
For the purpose of upholding security-concerned prospects, it is ample to come to terms
with the reality of the difficulty which actualizes itself as it is relatively problematic to reconstruct
the input-affiliated data from its output counterpart. Such is bound to happen even during stances
whereby involved users are in the know-how of hash function. For an accurate understanding of
the bone of contention. In the context of passwords, during periods when an account which
demands a password becomes created, the password experiences exposure unto the hash function
and then becomes stored in the database (Chi & Zhu, 2017). During another attempt aimed at login,
the password acts as the input. It thus runs through the hash, and then digest would undergo
comparison with the previous resultant outcome to aid in the verification of a possible match.
The supposed importance of the hashing mechanism is inherently remarkable. First and
foremost, the attribute empowers the involved users to realize the ease in finding records during
occasions when data becomes hashed. Geometric hashing exploited mostly in computer graphics
frequents the platform of establishing closet pairs alongside understanding problems of proximity
in planes. This feature is an ample necessity as its usage can aid involved practitioners in the
comparison of a significantly large amount of data (Lopez et al., 2017).Consequently, hashing is
of dire value as its algorithms are usable in the generation of random strings responsible for
assisting in the avoidance of duplication tendencies on stored data within the database systems.
The supposed leading association between hashing security mechanism and the encryption
affiliated mechanism is that they both function towards ensuring that there is an ambient realization
of security of the bestowed on the data. The encryption mechanisms work through the generations
of encrypted keys that are identical making the message to be decrypted while the hashing security
ensures the development of hash function which makes the ensures that the input is similar with
the output (Caviglione et al., 2017).
In conclusion, with regards to the attributes as mentioned above, it is accurate to fathom
that without preference, the hashing security mechanism is an ideal mode worthy of pursuing
securing data. Such is accurate as it provides a relatively more robust mechanism for securing
information by doing little good for empowering unauthorized users who would want to access
protected data. Further still, it is necessary to identify that the hashing mechanism shares an ardent
rapport with the encryption-centered methodology, which is to secure transmitted data of an active
user.
Initial Post 2:
The process of using some set of rules (algorithm) to put any amount or size of information in
uniform length is known as hashing. Its this result that is referred to as a hash value. With
increased Cybersecurity threats, this formula comes in handy, as it serves as a medium to ensure
that the given information is authentic. To say, that it hasn’t been tampered with or altered between
the sender and the receiver. To this end, encryption is introduced to serve as a protection of the
given data while it’s conveyed from the source to recipient. It’s made possible by confiscating the
information from one end that can only be retrieved on the other end by the recipient of the same
therefore making it a two-way process, one to lock and the other unlock from the other end.
Therefore, to this extent, this paper seeks to discuss the two mechanisms and their relation one to
the other (Wang, Zhu, Wu & Zhang, 2018)
Hashing is considered as one way as there is no need to undo it or is basically impractical.
Its work to serve as tamper-proof is done once the recipient runs the info, where the device used
confirms with the signed digital print mostly on the server that the sent information has the same
hash value on the recipients side as from the source, and if not a warning is issued (He, Chan &
Guizani, 2017).
Therefore, security is guaranteed as one who would try to steal the info will have to figure
out the password. However, there would be still a chance that an attacker could figure out the
password to a hash code via a rainbow table, but its countered by salting the hash value info.
Salting is the process where a random number is added to the password of hash coded info thereby
leaving no room for an attacker to figure out the given password in the hash coded info. This
irreversible process makes hashing a hundred percent secure (Albrecht, Grassi, Rechberger, Roy,
& Tiessen, 2016, December).
On the other hand, encryption is quite the opposite as it’s a two-way process. Here the plain
text is encrypted such that its unreadable. Such is achieved by following a set of guidelines also
known as a cipher or an algorithm. It’s obvious that an encrypted message need be decrypted to
make it readable again to the recipient, who will need the same proper key used in the inscription
to read the message. The reversible process makes the method quite insecure as an attacker who
seeks to steal the information, with it will be the key to decrypt (El-Shimi, Oltean, Kalach,
Sengupta, Dsouza & Venkatesan, 2016).
Conclusion
In conclusion, the difference between the two is clear. However, the two can be used to improve
a site’s security greatly. For instance, while a hash value of info cannot be decoded despite a breach,
it serves as a good medium of storage especially passwords, on the other hand, encryption keeps
the secure message while in transit as its unreadable (Guesmi, Farah, Kachouri & Samet, 2016).
Therefore, encrypted messages can have their passwords saved in hash value for ultimate security.
Instructions:
Need 2 Responses (Please see uploaded document to see other student posts)
Need minimum 250 words for each response
Need 2 APA References for each response (Please make sure to use 2015 and above
sources)
In Responses Please state why you agree (or not) with your peers.
Consider other deployment models (including combined models) that might be more
appropriate for that type of business.
Purchase answer to see full
attachment
Science is the pursuit and application of knowledge and understanding of the natural and social…
Clearly stating the definition, the values, the meaning of such values and the type of…
All answered must be typed using Times New Roman (size 12, double-spaced) font. No pictures…
All answered must be typed using Times New Roman (size 12, double-spaced) font. No pictures…
https://www.npr.org/sections/ed/2018/04/25/605092520/high-paying-trade-jobs-sit-empty-while-high-school-grads-line-up-for-university Click on the link above. Read the entire link and answer the questions below…
All answered must be typed using Times New Roman (size 12, double-spaced) font. No pictures…