Nobody downloaded yet

Technology of Information Security - Essay Example

Comments (0) Cite this document
Technology of Information Security Name Institution Technology of Information Security Introduction The use of cryptography is a necessity for the consequence of the revolution of information in the world today. Electronic communications is widely used and to make conversations very confidential, cryptography gives the solution for the problem though it has been majorly spawned by a serious debate (Mel and Baker, 2000)…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.9% of users find it useful
Technology of Information Security
Read TextPreview

Extract of sample
"Technology of Information Security"

Download file to see previous pages As technological advancement keeps coming, several reliable cryptography methods are continuing to emerge. Data encryption has a number of advantages and disadvantages. Its disadvantages come mainly because the technology is sometimes not used as required. Cryptography is a very powerful and important technology that can be used to protect information sent to emails and all financial based transactions. Information needs to be shared in order to make various decisions that govern various activities. For this reason, information should be as confidential as possible for sustainability and accuracy of its use. Data encryption techniques offer a solution for the protection of information against all third parties. The techniques are basically needed for information to be encrypted whereby one party shares its information with a recipient. On the other hand, enemies can hack into people’s accounts and plot violence against a country with knowledge of cryptography. Some governments want to restrict its use for fear of criminals and spies using the technology for their good and to the disadvantage of the nation. How Encryption Technique works Encryption is a process whereby messages are converted into a form that has been created that without decrypting or deciphering, they cannot be read. Encryption uses a systematic procedure or algorithm which converts messages or data to their original form. The cryptologists are engaged in competition that will never end in a bid to create better and stronger techniques that will be used by parties to protect their data. Although other methods of deciphering exist, the recent systems are more powerful to an extent that they are almost unbreakable even with the use of powerful computers. The new cryptosystems use mathematical formulae that are very complex and which effectively resist breakthroughs. The Use of PGB There are several popular encryption systems used in the world today. They include the data encryption standard (DES), pretty good privacy (PGB), and the Rivest Shamir, Adleman (ARS) system. The DES system uses a single key and it has been developed in the USA. The RSA on the other hand uses two keys and was generally made just for the public use and named after the people who developed it (Frazier2004). Pretty Good Privacy (PGB) helps internet users to keep all their communications private. It is a two key system which enables a computer to send encrypted messages using a chosen private key that only the sender knows. All the computers that will receive the email message are given a copy of the private key which later establishes the message sender. When using the public key method, the one who sends the message and the receiver are both able to authenticate each other and also protect the message which is usually secret. Advantages of Encryption Techniques Encryption techniques make information unreadable to people who are not supposed to access the information. This is very important to many organizations because no third party can access information without being allowed to do so by the sender. The information cannot be accessed even through the administrator’s server leave alone other computers. This improves loyalty and secrecy in the organization or any governments in the world today. Data encryption is regarded as a national issue by governments because it majorly ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Technology of Information Security Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Technology of Information Security Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1453415-technology-of-information-security
(Technology of Information Security Essay Example | Topics and Well Written Essays - 750 Words)
Technology of Information Security Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1453415-technology-of-information-security.
“Technology of Information Security Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1453415-technology-of-information-security.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
Information Security
In this scenario, the technical potentials of the web based technology such as internet offer the facility for the information to be collected, shared, and dispersed, with relative easiness. In spite of the management lapse, customers are generally worried about the security of private information utilized by companies.
10 Pages(2500 words)Essay
Assessment of Technology centric Strategies for information security in an organization
Information Assurance is the confidence that information systems will protect the information they handle and will function as they need to, when they need to, under the control of legitimate users. "Defense in Depth is a practical strategy for achieving Information Assurance in today's highly networked environments.
3 Pages(750 words)Essay
Information Technology Security
The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security. Confidentiality of information relates to safeguarding of information from disclosure to unauthorized parties (Feruza and Kim 2007, pp.19).
3 Pages(750 words)Essay
Information Security
The objective data demonstrates a couple of points quite clearly. First, as noted by Angus, the organizations that decide to implement the strictest types of security are often much less secure than companies with more balanced approaches to security; he refers to this as a U curve in which a certain level of complexity generates too many costs and complications (2005).
4 Pages(1000 words)Essay
Information Technology Security
Technology is shaping our world. It has become a part of everyone’s lives and it rules almost every action of ours. However, every new development has some merits and demerits. In this essay we
15 Pages(3750 words)Essay
VOIP security (information technology)
The five security threats are man in the middle attack, Phreaking, vishing, VoIP spam and distributed denial of service attack or simply DoS attack. VoIP network are vulnerable to MITM or man-in-the-middle attacks, this is due to insufficient verification of
3 Pages(750 words)Essay
Information Security
The organization deals with healthcare so, because of its nature of work it needs to store a lot of information regarding healthcare, finance and similar other
2 Pages(500 words)Essay
Technology of Information Security
On the other hand, some organizations prefer to store their data in the decentralized data storage system. In this scenario, each user is individually responsible for managing and updating his own data on his own computer. However, the most commonly used scenarios
2 Pages(500 words)Essay
Information Security
Confidentiality related with any information that is personal, need to be protected and information that is uniquely identifying meaningful data. Integrity is associated with any data that loses its originality and the recipient receives amended data. Availability simply
1 Pages(250 words)Essay
Information Technology Security
client personalities, access benefits for every framework and information gathering should be recognized, and access rights must be in accordance with characterized and reported business needs and it should reflect the ideas of minimum benefit and isolation of obligations
11 Pages(2750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Technology of Information Security for FREE!
logo footer
Contact us:
Contact Us Now
FREE Mobile Apps:
  • StudentShare App Store
  • StudentShare Google play
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • Miscellaneous
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us