Nobody downloaded yet

Security via technology - Research Paper Example

Comments (0) Cite this document
Summary
Cryptographic systems, which utilize two keys; a private keys that are known by receiving entity alone and public keys, which are known by all the entities (Lehtinen & Sr, 2011). For instance, when user A wishes to send a private message to user B, user A will use the User B’s…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Security via technology
Read TextPreview

Extract of sample "Security via technology"

Download file to see previous pages Public key cryptography is a combination of elaborately created procedures and standards that are meant to protect communications from being listened to or tampered with or being affected by impersonation attacks.
Public key encryption enables the free distribution of public keys and only the people who have been permitted are allowed to read the data that has been subjected to encryption through this key (Oppliger, 2011). Generally sending encrypted data entails encrypting the data to be sent with the encryption key that belongs to the receiver, and upon receiving the message, the receiver will decrypt the message using his or her own private key. In comparison to the symmetric-key encryption, the public –key encryption needs a lot more processing and may not be a practical option for the encryption and decryption of large amounts of information. Nonetheless, a public key can be used to send a symmetric key that can ultimately be used in the decryption of more data, which is the method that is employed by SSL/TLS protocol.
Additionally, the decryption of data that has been encrypted using a private key can be decrypted using a public key that corresponds to it although this approach is not recommended when that data to be encrypted is sensitive (Vaudenay, 2005). Nevertheless, since it implies that any person who holds the public key, which is usually made available to everyone, has the capacity to decrypt the data. However, private key encryption is still useful as it means that the private key can be employed in signing data with digital signatures, which are critical requirements in electronic commerce as well as other cryptographic applications of a commercial nature. Mozilla Firefox, as well as other client software, can employ public keys wen confirming that a message has been signed with the proper private key and that it has not be interfered with after being signed.
Even though the worldwide ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security via technology Research Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Security via technology Research Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1696802-security-via-technology
(Security via Technology Research Paper Example | Topics and Well Written Essays - 1000 Words)
Security via Technology Research Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1696802-security-via-technology.
“Security via Technology Research Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1696802-security-via-technology.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Security via technology

Security Technology

...?Personal Experience Essay Introduction Security technology is an important part of any business, enabling businesses to protect their assets while reducing the amount of physical labor and time that is required. This allows the business to reduce their costs, by requiring fewer employees, or allocating employees to other tasks. Security cameras are one aspect of business security that is commonly used across many different business types. Often a number of video cameras transmit their signals to a specific point, frequently a set of monitors. This system is known as closed-circuit television (CCTV) the name derives from the fact that although a television signal is...
8 Pages(2000 words)Essay

Border Security Technology Deployment

...? REQUIREMENT COMPLEXITY IN THE SITUATION SBInet as a system represents a complex case of conflicts of interests whereby National Security concerns are marred by political interference This is especially evident in the statement acquired from the contractor. In the contractor’s point of view, the job that had been assigned to him/her was virtually impossible because of the lack of independence in his/her work. The assignment was the provision of technology but officials who had little or no knowledge in technology called all the shots in the assignment. Another case of political intrusion is mentioned by the Border Patrol Station Chief. He claims that some Washington based politicians had...
16 Pages(4000 words)Case Study

Information Security

...?INFORMATION SECURITY Information security Affiliation Table of Contents Table of Contents 2 SLP Information Security Management: Frameworks & Principles 3 Security Issue 3 SLP 2: Belief & Culture: Build Awareness 5 SLP 3: Politics & Legislation 7 SLP 4: Economics: Cost/benefit & Incentive Design 10 SLP 5: Security via Technology 11 Passwords Technology 12 Firewall Technology 12 Encryption Technology 13 References 13 SLP# 1: Information Security Management: Frameworks & Principles It is an admitted fact that information is extensively shared in almost all...
10 Pages(2500 words)Essay

Technology of Information Security

...? Technology of Information Security Technology of Information Security Introduction The use of cryptography is a necessity for the consequence of the revolution of information in the world today. Electronic communications is widely used and to make conversations very confidential, cryptography gives the solution for the problem though it has been majorly spawned by a serious debate (Mel and Baker, 2000). The technique has been in existence for a long time but is not yet fully reliable thus posing a danger to all the information that is shared via the internet. Methods of encryption are on the rise because of the rapid growth in the technology sector all over the world. As technological advancement keeps coming, several reliable... ...
3 Pages(750 words)Essay

Information Technology Security

...? Information Technology and Security Introduction CIA de s confidentiality of information, integrity of information, and availability of information. Information bears significant value, especially in the contemporary business world. The protection of such information as bank account statements, credit card numbers, personal information, government documents, and trade secrets remain a critical part of information security. Confidentiality of information relates to safeguarding of information from disclosure to unauthorized parties (Feruza and Kim 2007, pp.19). Some of the dominant means of managing confidentiality on systems encompass access control lists, traditional Unix file...
3 Pages(750 words)Essay

Wireless technology security

...station gateways and wireless bridging relays, WWANs allow users with laptops fitted with WWAN cards to connect to virtual private networks, read email and surf the web from any location inside the cellular service’s regional boundaries. Access may be facilitated by payment of monthly connection fees or a pay-per-need basis. Certain models of mobile phones may also be connected to laptops via a Universal Serial Bus cable (USB) and act as modems to link to a WWAN (Pollino & Schiffman, 2002). However, extra costs may be incurred and connection speeds slowed down. Security and Vulnerability Issues Wireless networks are a relatively new concept and as is the case with most new technologies,...
6 Pages(1500 words)Research Paper

Information Technology Security

...Information Technology Security Submitted by: XXXXX XXXXXXX Number: XXXXXXXX of XXXXXXXX XXXXXXXX XXXXXXXXX Subject Code: XXXXXXX Date of Submission: XX – XX – 2009 Number of Words: 3892 (Excluding References) Table of Contents Table of Contents 1 Introduction: 2 What is Computer Related Crimes: 3 Types of Computer Related Crimes: 4 Conclusion: 14 References 16 In the world today where much depends upon computers and their associated networks, computer –related crime appears to becoming a major problem. Describe and analyse the range of computer related crimes and, based on this analysis, offer up some effective countermeasures. Introduction: Over the past few decades technology has grown to great heights and is still improving... that...
15 Pages(3750 words)Essay

Technology of Information Security

...TECHNOLOGY OF INFORMATION SECURITY Technology of Information Security Affiliation At the present, the majority of business organizations use a distributed computing environment to store their data and information. In this scenario, their data and information are stored in different locations. For instance, in many cases data and information are kept on a centralized server. On the other hand, some organizations prefer to store their data in the decentralized data storage system. In this scenario, each user is individually responsible for managing and updating his own data on his own computer. However, the most commonly used scenarios at the present are a mixture of these...
2 Pages(500 words)Essay

Information Technology- Security

...Information technology- Security Information technology- Security Information Assurances Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources. According to Herold & Rogers (2011), the concept has many dimensions that include completeness, validity, steadfastness, timeliness, integrity and confidentiality. In organizations, the protection of information from unauthorized access and alteration is the main aim of information assurance. As such, the appropriate use of information helps in securing organizations from risks. In the United States, records concerning the use of information indicate that the concept has been... ...
2 Pages(500 words)Research Paper

Information Security Management in the USA

...iteration of Windows Operating system. It is estimated that IT product suite will be intrinsically vulnerable. Safety in products is an effective approach. On the whole, protected products are identical from vulnerable products; consequently businesses are less incentivized to offer protected products since the customer is incapable to clarify the difference between different products at marketplace (Schneier, 2006), (Guerra, 2009) and (ITManagersInbox, 2010). SLP 5: Security via Technology Now this section discusses the solution of above discussed security issue by using latest security technology. A lot of researches have been...
10 Pages(2500 words)Dissertation
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Security via technology for FREE!

Contact Us