Last Updated on April 30, 2021 by Admin
During a recent pandemic, employees from ABC company were allowed to work from home. What security technology should be implemented to ensure that data communications between the employees and the ABC Head Office network remain confidential?
- a symmetric or asymmetric encryption algorithm such as AES or PKI
- a hashing algorithm such as MD5
- a hash message authentication code such as HMAC
- a hash-generating algorithm such as SHA
Answers Explanation & Hints:
MD5 and SHA are hash-generating algorithms that guarantee that no one intercepted the message and altered it. Advanced Encryption Standard (AES) is a popular symmetric encryption algorithm where each communicating party needs to know the pre-shared key. Public key infrastructure (PKI) is an asymmetric encryption algorithm based on the assumption that the two communicating parties have not previously shared a secret key. HMAC is a hash message authentication code that guarantees that the message is not a forgery and actually comes from the authentic source.