CISA Made Easy

                                           - easy CISA preparation

Monday, July 21, 2008

Important Points to Remember about Symmetric & Asymmetric Cryptography for CISA Exam.

1. Symmetric Cryptography uses same key to encrypt and decrypt the message. That is why the name is Symmetric Cryptography.

2.The key used in Symmetric Cryptography is called Symmetric Key.

3. Some examples of Symmetric Cryptography includes:

DES (Data Encryption Standard)
Double DES
Triple DES
AES (Advanced Encryption Standard
RC4
RC5
RC6

4. Asymmetric Cryptography uses a set of key called Public Key or Private Key.

5. If One key in Asymmetric Cryptography is used for encryption, the other key is used for decryption.That is why the name is Asymmetric Cryptography.

6.Some Examples of Asymmetric Cryptography includes :

RSA
Elliptic Curve Crypto system


Question for you to think about:

1. Which of the the cryptography is faster and why?


2. Which of the above helps in

Confidentiality?

Nonrepudiation ?

Authentication?

Authorisation ?


3. Which algorithm is more complicated and why?

4. Can both be clubbed?


Although I shall try to discuss each of the above in my future posts? But answering each of the above will make you further prepared for this topic for CISA Exam.



CISA Type Question 08-2107

When data volume is more which cryptography is fast and suitable method to encrypt such data?

1. Symmetric Cryptography
2. Asymmetric Cryptography
3. Both are equally efficient




Answer to CISA Type Question 08-1507


Thing that an Penetration tester/IS Auditor will request for, after receiving scope of audit is Network topology map beside other information. So, the correct answer should be 1. Network Map of the organization

Readers who visited this post also read :

0 comments:

 

Home | | | | |

CISA made Easy - Easy CISA Preparation