Encryption essay
Encryption involves scrambling data to ensure nobody else understands it, only those with authority. Data can be encrypted in various forms, when it is in rest. When it is in motion or when it in transition. Data can also be encrypted when it is in use. Encryption ensures that data only goes to the owner or the intended to go to. Data at rest is still secure if it is encrypted by ensuring nobody has access to it. When a person steals hard drive information in the hard drive is still secure if the hard drive is encrypted. Encryption provides a privacy of data from second or third parties. It prevents data leak to wrong recipients. There are various types of encryption algorithms. They include blowfish, AES, RC4 DES and Twofish. Encryption needs to be complex and extremely strong to ensure that it very secure. Encryptions that are not strong and complex can easily be cracked through guess work.
Data at rest is protected and encrypted using file system user policy through preventing people who are not authorized to access it to get it. A database has information that has various levels of privacy and is accessed by a variety of users. Databases are very important to business people because they contain sensitive information that can’t be shared. Encryption of a database adds an extra layer of security to make it unusable if the effort to acquire access to raw data is not achieved. Encryption is the strongest data protection strategy for data at rest.
Network access policy also provide encryption to the data through virtual private network which ensures that data does transit to third parties by controlling access of data at transition.Encryption technique rhat is used to protect data at transict is SSL,secure socket laler.Data at rest is easy to secure because you only need to prevent data accessthrough preventing unauthourised personell from coming into contact with the information.
Data at rest and at transit are usually well protected while data at operation is usually less secure. For example, when shopping at an online store. For example, in an on-line shop apps, data showing a shopping list may be encrypted when the data are sent from a shopping cart device to a store server (e.g., in transit), and the corresponding transaction record may be well protected at the store database (e.g., at rest). However, during the shopping time, a user’s input to the shopping list at the local computer may be wide open to third-party through furtively trying to acquire it. Similarly, a approval message received from the store server, which acknowledges and provides details of the transaction, may also be wide open to third-party stealing. In another example, with a remote medical diagnosis application, a patient’s personal and medical data may be well protected by authentication, access control and encryption, when such data is at rest or in transit. Nonetheless, such information when processed and displayed by the application on the local device may be exposed to third-party prying. Accordingly, improved methods for shielding active data are necessary.