StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

The Pros and Cons of Using Encryption as a Key Technological Solution to Corporate Security - Essay Example

Cite this document
Summary
ENCRYPTION AS A KEY TECHNOLOGY Encryption as a key technology Author Author Affiliation Date It is assessed that a safe computing atmosphere would not be comprehensive without implementation of encryption technology. In this regard, the idea of encryption focuses on the application, working and obscuring the importance of a portion of data and information by encoding it in such a manner that it could only be decoded, comprehended and interpreted by the people for whom the information is planned…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.4% of users find it useful
The Pros and Cons of Using Encryption as a Key Technological Solution to Corporate Security
Read Text Preview

Extract of sample "The Pros and Cons of Using Encryption as a Key Technological Solution to Corporate Security"

Download file to see previous pages

Moreover, the encryption can be employed to offer high level security to e-mail, network communication, data and information stored on hard drives or any portable or mobile disks, as well as other information that necessitates safety (Cook, 2000). This paper discusses some of the main areas and aspects of encryption and its main applications, organizational implications and the evolution of old and current practices. Application of Encryption Encryption is technique of translation of information and data into a clandestine code.

Additionally, the technique of encryption is the most efficient method to assure data security. In this way, to interpret an encrypted file, we should have access to a password or else secret key that facilitates us to decrypt it. Unencrypted information as well as data is known as plain text; hidden or encrypted data is known as cipher text (Webopedia, 2010). An unbelievable development of the Internet has energized companies as well as customers in a similar way through its assurance of altering the means we subsist and work.

It is very simple to purchase and sell goods all through the world using a computer or laptop. However safety and security is a main distress on the Internet, particularly when we are utilizing it to transmit sensitive data and information among diverse groups of people (Tyson, 2010). In case of Encryption techniques we need to encrypt a huge number of secret information and data. For example in case of web based business or corporate data transfer we need some sort of sensitive and high value information like credit-card information, confidential communication, social security information, susceptible business details, personal details and bank-account information.

In this scenario, the information security is offered on computers and over the Internet through a multiplicity of techniques. An easy and straightforward security technique is to simply put sensitive information on removable storage media similar to moveable pen drives or peripheral hard drives. However the majority well-liked types of safety the entire depend on encryption, the procedure of hiding and encoding data and information in such a manner that just the person (or computer) that has the decoding key is able to decode the message (Tyson, 2010).

Evolution of Encryption In its first kind, people have been trying to hide certain data and information that they desired to keep in their own control through alternating parts of the information by means of signs, pictures as well as numbers. Earliest Babylonian merchants employed intaglio, a part of plane stone engraved into a collection of images as well as a number of writings to recognize them in trading matters. However, through this method, they are creating what these days we recognize as 'digital signature.

' The people are acquainted with that a specific 'signature' having relation to this merchant, however just he had the intaglio to generate that specified signature. Certainly, technology nowadays has developed at such fast swiftness that requires caring for information develops by decreasing the dependability of older encryption

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Pros and Cons of Using Encryption as a Key Technological Solution Essay”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1406838-the-pros-and-cons-of-using-encryption-as-a-key
(The Pros and Cons of Using Encryption As a Key Technological Solution Essay)
https://studentshare.org/environmental-studies/1406838-the-pros-and-cons-of-using-encryption-as-a-key.
“The Pros and Cons of Using Encryption As a Key Technological Solution Essay”, n.d. https://studentshare.org/environmental-studies/1406838-the-pros-and-cons-of-using-encryption-as-a-key.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Pros and Cons of Using Encryption as a Key Technological Solution to Corporate Security

Security through Authentication and Encryption

The paper "security through Authentication and Encryption" states that authentication while encrypting the data allows any organization to get security over the network, thereby utilizing its resources without any hassle or threat of being attacked by the hacker.... hellip; It is evident that a firewall is not enough and not the only solution that guarantees security.... Instead, there is a need for strong user authentication and encryption along with other techniques and policies that can help in creating user accountability and confidentiality so as to ensure the security of an e-business....
8 Pages (2000 words) Coursework

Public Key Encryption and Digital Signature

A successful attack on certification authority will allow an adversary to impersonate whomever the adversary chooses by using a public-key certificate from the compromised authority to bind a key of the adversary's choice to the name of another user.... This paper under the headline 'Public Key Encryption and Digital Signature" focuses on the fact that the primary advantage of public-key cryptography is increased security and convenience because private keys are never transmitted or revealed to anyone....
17 Pages (4250 words) Assignment

Asymmetric or Symmetric Key Encryption

This encryption technique provides higher security as it makes use of two keys: one for encryption and another for decryption.... This paper “Asymmetric or Symmetric key Encryption” presents an overview of two encryption techniques.... hellip; The author states that symmetric key encryption is also known as a shared key or shared secret encryption.... Basically, in symmetric key encryption, both the data sender and receiver make use of the same key to both encrypt and decrypt data....
2 Pages (500 words) Case Study

SQL Server Column Level Encryption

Uniquely, a certificate is created as a digitally signed security object that helps in the determination of authorized and unauthorized access to a database.... Identically, exposure of sensitive data to unauthorized personnel is harmful to the parent firm as it may suffer from corporate espionage.... dvantage of the solution The use of column level encryption provides users, in this case the research firms, the option of encrypting only the sensitive data on the various columns that may be specified within the SQL Server Database....
2 Pages (500 words) Case Study

HSM Performance Optimization by Using a Key Pool Solution

The paper "HSM Performance Optimization by Using a key Pool Solution" describes that NetONet HSMs originally performed all the crypto operations that are performed within the HSM and therefore it only allowed the results of these operations to be available outside the HSM.... eneral specification and capabilities A hardware security module (HSM) can be described as a cryptoprocessor that is dedicated and it is specifically designed to be used for the protection of the crypto key lifecycle....
21 Pages (5250 words) Research Paper

Security via Technology, Public-Key Cryptography

For instance, when user A wishes to send a private message to user B, user A will use the User B's… Therefore, public key cryptography as well as associated standards and procedures are basics of the security features of numerous products including encrypted and signed Public key cryptography is a combination of elaborately created procedures and standards that are meant to protect communications from being listened to or tampered with or being affected by impersonation attacks....
4 Pages (1000 words) Research Paper

Internal and External Is Enviorment of Ocado

They use widespread sense instead of corporate manuals and, in all cases; they care enough to try to make a disparity.... By using exclusive logistics software and satellite direction-finding systems in our vans, we strive to deliver the correct goods at the right time (Rotorua, 1988)....
10 Pages (2500 words) Case Study

Symmetric Encryption Algorithms

Federal Government established standard or FIPS used for digital security and secret signatures.... In addition, the identical “encryption key” is utilized for every data block.... SA asymmetric encryption is the most well-known asymmetric algorithm based on public key infrastructure, distinguished after its developer Adleman and Rivest, Shamir.... In addition, the encoding key employed for encryption is a kind of public key known to all as well as the key utilized for decoding the original message is the user's private key....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us