StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Phone Call Encryption - Essay Example

Cite this document
Summary
The paper "Phone Call Encryption" highlights that there is always an increase in the cost of encryption when there is a need for alternative data storage. The cost will increase as there will be the need for transferring the data in the phone to an alternative storage device…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Phone Call Encryption
Read Text Preview

Extract of sample "Phone Call Encryption"

Phone calls encryption affiliation Phone call encryption There are ways that have been used to encrypt phones with consideration of VoIP technology. The technology used in the area consists of two or more IP systems that can be connected to the traditional phones. The main reason why encryption of phones is done is to bring the ability to tap or intercept the phone calls that are made at different points. The main reason why there has been the practice is due to the fact that in the past, there has been development in the interest towards the data that is transmitted from one point to another through the phone calls (El Kourd, Hamad & El Kourd, 2014). This also came about due to the report that there was collection of data on phone calls that are made by different people in a country. Encryption is mainly done when the data that one has in the phone is needed in a state that is unreadable with the others at different points. With the process, when one powers on the phone, there will be the requirement to enter encryption password or pin. The phone uses the password and pin to decrypt an individual’s data making it understandable. When one does not have the knowledge of the pin or password, there will be no access to the data in the phone. The process is ideal when it contains data that is so much sensitive. There are warnings that are associated with encryption of data. Before one takes the process of encryption, there is need to make sure that there is awareness of the problems that are likely to come up due to the process. How to encrypt a mobile phone Encryption of mobile phones depends on several factors. Encryption that done to phones take an hour or a longer time depending on the data that is stored in the phone. In encryption, the device is plugged and this is done after ensuring that there is enough time for the activity. Encryption should be given time as disturbance of the process may lead to loss of some are all the data that is stored in the phone (El Kourd, Hamad & El Kourd, 2014). Before one continues with the process, there should be the surety that there is a screen lock or password that is set to the device. There will be no encryption in the phone when there is no password that is set. After setting password on the phone, there is probability to carry out the encryption. Open the setting menu on the device, move to security settings and choose the option of encrypt phone under the encryption menu. The warning information that is given is then read to ensure that one is familiar with the instruction before continue button is touched. The phone will then be ready for encryption and when the device was not plugged, it will give a warning requiring it to be plugged. The progress of the process will then appear and after the instruction and progress are complete, the phone will be fully encrypted. Importance of phone encryption Phone encryption is important to business as it is able to store and protect data that is sensitive to the business away from the access of those that are not authorized. Organizations with sensitive business data on company phones will want to use encryption to help protect that data from corporate espionage. Those that tend to access the data will not be able to do so without having an n encryption key. There is protection of the data though there is still the probability of freezer attack that makes one being able to access the data without the key. The process is also important when there is the loss of a phone that contains important data of a business as there will be no probability of access to the data and the thief will be more interested in selling the phone as opposed to access the data that is in it after the lock code is required. In companies, there have been suggestions that the process can protect a business from warrantless searches. There are rulings that have been made that states that a police officer is able to conduct a search on ones phone without a warranty during the time of arrest. In this situation. The person will not be able to access the important business factors that are in the phone. In the situation it must be through the warrant of one that they will be able to access the data that is in the phone. Several courts have ruled that there is no opportunity that one should have in an n encrypted phone. This has enable protection of data that a business has. Phone calls encryption addresses the crucial technical problems of delivering a stronger encryption across the phone networks while maintaining a higher performance voice call parameters like low latency, call setup, and high voice quality. This is done with the help of Mobile Content Protocol over the internet protocol. This is well represented in the picture below. Another importance of phone encryption is that businesses have the option of operating their own secure and private network by using Cell crypt’s private switch. The switch consists of the signaling server and the management console within the infrastructure of the network. The switch enables the business to control and manage a complete set of users, secure numbers and a collection of devices as shown in the picture below Problems associated to phone calls encryption There are problems that are associated to phone call encryption. The warnings are always given to an individual before encryption of the phone is carried out. Phone call encryption leads to slow performance in making of calls as there are additions of overheads. The actual speed that is decreased by the encryption depends on the hardware of the phone (Huynh, 2014). Reduction on the performance may make the activities that the phone is intended to perform. This reduces the efficiency of the phone. Encryption is a one way process only. Once the process is carried out in a phone, there is no way it is removed unless the phone is restored to its factory settings. Lack of flexibility in the process may not be desirable to businesses as there may be others in the organization that would want to use the phone but are not aware of the unlock keys (Huynh, 2014). This makes the process to be sometimes not convenient to all the users. Cost of phone calls encryption The cost that is associated to the encryption is low. The low cost is due to the fact that when one makes a call the rates are still the same as there is no extra cost is needed for the compensation of the process (Jakobsson, 2012). There could be reduction in the cost of using encrypted phones as there is no interference in communication that might lead to increment in cost of call. These costs are low as long as one has a phone that accepts the process. The costs are reduced through the process as there are minimal risks that are able to occur. In rare cases, there is always increase in the cost of encryption when there is need of an alternative data storage. The cost will increase as there will be the need of transferring the data in the phone to an alternative storage device (Jakobsson, 2012). The device is what results to increase in the cost of the process. For the encryption cost, the price changes depending on the capacity. As shown in the figure below Encryption Cost Business Capacity Encryption Fee 1 Employee $ 1,500.00 2-5 Employees $ 4,500.00 6-10 Employees $ 12,000.00 11-20 Employees $ 24,000.00 21-50 Employees $ 60,000.00 51-100 Employees $ 120,000.00 101-500 Employees $ 600,000.00 501-1000 Employees $ 1,200,000.00 More than 1001 Employees $ 1,500,000.00 Worthiness of phone calls encryption on cost Phone encryption is important and when compared to the cost, there is need to carry out the encryption. Phone encryption is important to business as it is able to store and protect data that is sensitive to the business away from the access of those that are not authorized. Organizations with sensitive business data on company phones will want to use encryption to help protect that data from corporate espionage. Through this there will be the reduction of costs that are likely to come about due to one getting in the data of a business. References El Kourd, S., Hamad, H., & El Kourd, K. (2014). Encryption System Appling The Dynamic Location Of Mobile Phone. Saarbrücken: LAP LAMBERT Academic Publishing. Huynh, V. (2014). Knowledge and systems engineering. Cham: Springer. Jakobsson, M. (2012). Mobile Authentication. New York: Springer. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Phone Call Encryption Essay Example | Topics and Well Written Essays - 1250 words, n.d.)
Phone Call Encryption Essay Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/technology/1867836-as-you-suggest
(Phone Call Encryption Essay Example | Topics and Well Written Essays - 1250 Words)
Phone Call Encryption Essay Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/technology/1867836-as-you-suggest.
“Phone Call Encryption Essay Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/technology/1867836-as-you-suggest.
  • Cited: 0 times

CHECK THESE SAMPLES OF Phone Call Encryption

Small Scale Digital Device Forensics Lab Project

Finally, select the backup command button Note: With the encryption, you may be prompted to include a password.... From the Domino mail server's perspective, the activity generated by the BlackBerry Enterprise Server is similar to the activity of an active user or another Domino server accessing it for replication; it is just another Notes Remote Procedures call (NRPC) session.... Using a lightweight API call, the BlackBerry Enterprise Server quickly determines if further analysis of the mail file is required....
4 Pages (1000 words) Essay

Huffman trucking: solving the problem,service request SRT-ht-010

One new form of encryption is the Babylon nG.... The encryption changes every time a call is made and each handset has its own unique encryption key.... PBX (Private business exchange) phone systems are beneficial within the hub offices however; require a driver to use the phone, which requires costly stoppages, or potentially dangerous phone use while driving.... A simple solution therefore should be utilized with the current availability of satellite phone repeater systems connected to voice operated GPS navigation and communication services....
2 Pages (500 words) Essay

Current Business Opportunities of AT&T Inc

The paper “Current Business Opportunities of AT&T Inc” highlights the marketing and technological capabilities of a well-known telecommunications corporation, the success of which is largely due to active investment in research and development and innovation in the workplace.... hellip; The company was earlier known as the Southwestern Bell Corporation, it was created in 1983....
8 Pages (2000 words) Case Study

Information Systems

WLAN installations require a documented security policy, the use of data encryption, verification of ongoing policy enforcement and security incident reporting procedures.... For example a nurse can quickly check on a patient's status with a voice call or get a second opinion from another care giver remotely using the communication devices.... For example a nurse can quickly check on a patient's status with a voice call or get a second opinion from another care giver remotely using the communication devices....
2 Pages (500 words) Essay

EBusiness and Ethics

Protection of data entails using encryption for the most sensitive files such as the financial records, tax returns, and backing up the significant data regularly, as well as storing them on another location.... Though several techniques have been developed to deal with this, emerging and re-emerging threats to computer information are still Cell phone Projector Proposal: MIS Business Concerns Ethical concerns have been on the increase regarding information technology use....
2 Pages (500 words) Essay

Ethical, Legal, and Professional Issues in Computing

The paper "Ethical, Legal, and Professional Issues in Computing" examines the ways computer crimes can harm a firm's assets and how to prevent them.... One of the key acts is the Computer Fraud and Abuse Act through which the affected employer can initiate legal proceedings against the employee.... hellip; Safeguarding critical information in an organization involves securing it and keeping it in the right hands with the aid of Information technology tools and by following important data protection protocols or policies....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us