Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
How can a confidential message be securely distributed?
Home
Secure Programming Practices
How can a confidential message be securely distributed?
0
votes
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
How can a confidential message be securely distributed?
1. Encryption the message with the receiver's public key
2. Encryption a hash of the message
3. Authentication the message by a certificate authority
4. using a password-protected file format
ssa
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 17, 2021
by
DavidAnderson
Encryption the message with the receiver's public key
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: Securing a database application with username/password access control should be considered
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
secure-programming
0
votes
Q: Error Handlinug reveal stack traces or other overlay informative error message to users. this will be categorized under security Misconfiguration?
asked
Mar 17, 2021
by
DavidAnderson
ssa
0
votes
Q: Which of the following can lead to leakage of private data?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: The use of proper security techniques can :
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: In Public-Key cryptography each user has a pair of cryptography keys - a _______ encryption key and a __________decryption Key.
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: Which of the following is a security advantage of managed code cover over unmanaged code?
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
manage-code
0
votes
Q: Which of the following term refers to an activity which involves criminals searching through trash bins and waste cans to find sensitive information
asked
Mar 17, 2021
in
Secure Programming Practices
by
DavidAnderson
ssa
0
votes
Q: Both Digital Signature & Message Authentication code (MAC) provides authentication.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
digital-signature
message-authentication-code
mac
ssa
0
votes
Q: Both Digital Signature & Message Authentication Code(MAC) Provides Non Repudiation
asked
Mar 17, 2021
by
DavidAnderson
ssa
0
votes
Q: Temporarily files created by applications can expose confidential data if:
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
#temporarily-files
secure-programming-practices
confidential-data
security-data
...