Nobody downloaded yet

Technology of Information Security - Essay Example

Comments (0) Cite this document
Summary
Technology of Information Security Name Institution Technology of Information Security Introduction The use of cryptography is a necessity for the consequence of the revolution of information in the world today. Electronic communications is widely used and to make conversations very confidential, cryptography gives the solution for the problem though it has been majorly spawned by a serious debate (Mel and Baker, 2000)…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
Technology of Information Security
Read TextPreview

Extract of sample
"Technology of Information Security"

Download file to see previous pages As technological advancement keeps coming, several reliable cryptography methods are continuing to emerge. Data encryption has a number of advantages and disadvantages. Its disadvantages come mainly because the technology is sometimes not used as required. Cryptography is a very powerful and important technology that can be used to protect information sent to emails and all financial based transactions. Information needs to be shared in order to make various decisions that govern various activities. For this reason, information should be as confidential as possible for sustainability and accuracy of its use. Data encryption techniques offer a solution for the protection of information against all third parties. The techniques are basically needed for information to be encrypted whereby one party shares its information with a recipient. On the other hand, enemies can hack into people’s accounts and plot violence against a country with knowledge of cryptography. Some governments want to restrict its use for fear of criminals and spies using the technology for their good and to the disadvantage of the nation. How Encryption Technique works Encryption is a process whereby messages are converted into a form that has been created that without decrypting or deciphering, they cannot be read. Encryption uses a systematic procedure or algorithm which converts messages or data to their original form. The cryptologists are engaged in competition that will never end in a bid to create better and stronger techniques that will be used by parties to protect their data. Although other methods of deciphering exist, the recent systems are more powerful to an extent that they are almost unbreakable even with the use of powerful computers. The new cryptosystems use mathematical formulae that are very complex and which effectively resist breakthroughs. The Use of PGB There are several popular encryption systems used in the world today. They include the data encryption standard (DES), pretty good privacy (PGB), and the Rivest Shamir, Adleman (ARS) system. The DES system uses a single key and it has been developed in the USA. The RSA on the other hand uses two keys and was generally made just for the public use and named after the people who developed it (Frazier2004). Pretty Good Privacy (PGB) helps internet users to keep all their communications private. It is a two key system which enables a computer to send encrypted messages using a chosen private key that only the sender knows. All the computers that will receive the email message are given a copy of the private key which later establishes the message sender. When using the public key method, the one who sends the message and the receiver are both able to authenticate each other and also protect the message which is usually secret. Advantages of Encryption Techniques Encryption techniques make information unreadable to people who are not supposed to access the information. This is very important to many organizations because no third party can access information without being allowed to do so by the sender. The information cannot be accessed even through the administrator’s server leave alone other computers. This improves loyalty and secrecy in the organization or any governments in the world today. Data encryption is regarded as a national issue by governments because it majorly ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Technology of Information Security Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Technology of Information Security Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1453415-technology-of-information-security
(Technology of Information Security Essay Example | Topics and Well Written Essays - 750 Words)
Technology of Information Security Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1453415-technology-of-information-security.
“Technology of Information Security Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1453415-technology-of-information-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
CHECK THESE SAMPLES - THEY ALSO FIT YOUR TOPIC
INFORMATION TECHNOLOGY: SURVEILLANCE SECURITY
... The report demonstrates a typical surveillance system for an organization, in order to protect the critical information assets from physical theft, unauthorized access, and natural disasters. Consideration is given to IP camera based surveillance systems, biometric systems for attendance and logging employee activity, Intrusion Detection systems for advanced security and enforcing access policies by active directory. Introduction Due to recurrent technological developments, information and communication technology frequently diverts in new dimensions. The research and development in the context of information and communication technology is very effective. Moreover, the new and advanced form of technology has also facilitated... ...
8 Pages(2000 words)Assignment
Cyber Security Information Technology Research Paper
..., it is from the nature of their positions that employees take advantage of the situation. Equally, failure of the information and communication technology department to restrict URL access may endanger the information of a given company. This is because some of the hackers are novices and only perform their functions when an opportunity is availed. In some cases, the employees may not intend to hack, but may opt to do so if they realize that some of the sites are not restricted (Hacking-Gurus, 2009). The role of the government in securing and protecting infrastructures from cyber attacks and damages Each government has a role, either direct or indirect in safeguarding...
5 Pages(1250 words)Research Paper
Information Technology Security
...? Information Technology and Security Introduction CIA de s confidentiality of information, integrity of information, and availability of information. Information bears significant value, especially in the contemporary business world. The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security. Confidentiality of information relates to safeguarding of information from disclosure to...
3 Pages(750 words)Essay
Information Technology Security
...Information Technology Security Submitted by: XXXXX XXXXXXX Number: XXXXXXXX of XXXXXXXX XXXXXXXX XXXXXXXXX Subject Code: XXXXXXX Date of Submission: XX – XX – 2009 Number of Words: 3892 (Excluding References) Table of Contents Table of Contents 1 Introduction: 2 What is Computer Related Crimes: 3 Types of Computer Related Crimes: 4 Conclusion: 14 References 16 In the world today where much depends upon computers and their associated networks, computer –related crime appears to becoming a major problem. Describe and analyse the range of computer related crimes and, based on this analysis, offer up some effective countermeasures. Introduction: Over the past few decades technology has grown to great heights and is still improving... that...
15 Pages(3750 words)Essay
VOIP security (information technology)
...Running Head: VoIP Vulnerabilities VoIP Vulnerabilities of Introduction VoIP or Voice over Internet Protocolis the technology which carries voice communications over packet switched networks or the IP networks such as the Internet. But VoIP networks are weak and are vulnerable to attacks. In my paper I will discuss the five security concerns related to VoIP networks. The five security threats are man in the middle attack, Phreaking, vishing, VoIP spam and distributed denial of service attack or simply DoS attack. Man in the Middle Attack VoIP network are vulnerable to MITM or man-in-the-middle attacks, this is due to insufficient verification of data, in this form of attack the attacker uses eavesdropping to make connections... with...
3 Pages(750 words)Essay
The impact of Compliance on an organisations existing information technology security
...advantage for an organization. Introduction Organizations are feeling the heat of non-complaint behavior and process and technology issues leading to mammoth losses, both financial and organizational. Executing leadership in agreement with IT security policy and compliance is emerging as a challenge. Compliance in an organization runs through the policy planning component and automation centers (Elliot 2008). Security is an essential feature in most of the organizations today and compliance gives visibility to the processes and controls within an organization. Research Question, Objective and Scope Keeping the importance of Information Security and its...
20 Pages(5000 words)Research Paper
Information technology director security plan
...breaches to senior management staff and the HR department. If I was an information technology director, I would: Ensure the protection and management of information technology resources. Ensure access control. Write down a formal security plan with all security vulnerabilities, authorizations and the security plan. Arrange a project team which would keep a check on security. Ensure purchase and implementation of virus protection, spam-filtering software, firewalls, updates, passwords and physical security. Keep and review regular backup of data. Data should be stored on the...
1 Pages(250 words)Coursework
Technology of Information Security
...TECHNOLOGY OF INFORMATION SECURITY Technology of Information Security Affiliation At the present, the majority of business organizations use a distributed computing environment to store their data and information. In this scenario, their data and information are stored in different locations. For instance, in many cases data and information are kept on a centralized server. On the other hand, some organizations prefer to store their data in the decentralized data storage system. In this scenario, each user is individually responsible for managing and updating his own data on his own...
2 Pages(500 words)Essay
Information Technology- Security
...Information technology- Security Information technology- Security Information Assurances Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources. According to Herold & Rogers (2011), the concept has many dimensions that include completeness, validity, steadfastness, timeliness, integrity and confidentiality. In organizations, the protection of information from unauthorized access and alteration is the main aim of information assurance. As such, the appropriate use of information helps in securing organizations from risks. In the United States, records concerning the use of information indicate that the concept has been... ...
2 Pages(500 words)Research Paper
Information Technology Security
..., and overseeing access rights (SAMPEMANE 62-65). New demands for SpiderWeb will be put together by client administration to the information or framework manager for endorsement and handling. In specific cases, the task of rights may be secured by the workers part or gathering participation, and oversaw by pre-established approvals for that gathering. Sellers or builders may be allowed access, focused around their association. The data owner of SpiderWeb will review and evaluate the request based on job functions. Once approved, access will be configured by the data custodians or system administrators (Tolone et al. 29-41). The provisioning methodology ought to incorporate an effective system for...
11 Pages(2750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Technology of Information Security for FREE!
Contact Us