A student logs into an information system which includes an…

A student logs into an information system which includes an intrusion detection system (IDS).  The student is following the directions for an assignment and attempts to perform an action as directed, but the system responds that it is not allowed.  The IDS raises an alert as a result of the student’s action.  Name the the type of notification the IDS generated and explain why the name is appropriate.  

A TLS session is using a cipher suite which has “_SHA” as it…

A TLS session is using a cipher suite which has “_SHA” as its last four characters.  Explain how a message from the browser to the server will be authenticated, as discussed in this course. Be sure to explain any key(s) used in the authentication process.  Note: Do not explain the workings of the authentication algorithm.  This question is about the use of that algorithm within TLS.