Jane is working as a security professional at CyberSol Inc. She was tasked with ensuring the authentication and integrity of messages being transmitted in the corporate network. To encrypt the messages, she implemented a security model in which every user in the network maintains a ring of public keys. In this model, a user needs to encrypt a message using the receiver’s public key, and only the receiver can decrypt the message using their private key.
What is the security model implemented by Jane to secure corporate messages?
LordXander
7 months, 3 weeks agoinsaniunt
9 months agonosavotor
9 months ago