Describe the methods used in each of the following protocols to prevent a replay attack:
a. Kerberos authentication
b. SET
c. Electronic cash
a. Authenticator
b. Transaction number
c. The bank keeps a list of tokens that have been deposited and will not deposit the same token twice.
You might also like to view...
Data in tables can be sorted in ascending or ________ order
Fill in the blank(s) with correct word
Comparison operators are used to compare two values
Indicate whether the statement is true or false
A ________ contains the field name, followed by a colon, then an expression
A) calculated field B) date field C) header field D) footer field
A company recently experienced a break-in, whereby a number of hardware assets were stolen through unauthorized access at the back of the building. Which of the following would BEST prevent this type of theft from occurring in the future?
A. Motion detection B. Perimeter fencing C. Monitored security cameras D. Badged entry