What are the drawbacks of using public key and private key encryption for transmitting documents?

What will be an ideal response?


Although public key and private key encryption for transmitting documents does provide a higher degree of security, it still has drawbacks. First, the user must consciously perform a separate action (such as encrypt a Word document) or use specific software (such as PGP or SCP) in order to transmit a secure document.The time and effort required to do so, albeit small,may discourage users from protecting their documents when in a hurry or simply tired of the additional steps that are required.A second drawback is that these actions only protect documents that are transmitted. Other communications performed over a wireless LAN, such as accessing corporate databases or sending and receiving e-mail messages, are not secure. Finally, if the server to which the device is connected over the WLAN does not support SSH or HTTPS, then even document transmissions cannot be easily encrypted.

Computer Science & Information Technology

You might also like to view...

When you have a class which has a dynamic array as one of it's members, you should also include _____________ in the class.

a. a copy constructor b. a default constructor c. a destructor d. the assignment operator e. all of the above f. none of the above

Computer Science & Information Technology

When you initiate the forwarding process, the original message is copied into a new message window with the address of the original sender. You can then enter the address of the person to whom you are forwarding the message, but you cannot add text to the forwarded message.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

An array that you can picture as a column of values, and whose elements you can access using a single subscript, is a ____ array.

A. single B. unilateral C. two-dimensional D. one-dimensional

Computer Science & Information Technology

In DHCP, what address is reserved for use by clients that are not yet configured with an IP address?

A) 127.0.0.1 B) 0.0.0.0 C) 255.255.255.255 D) 224.0.0.1

Computer Science & Information Technology