This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Encryption essay

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Encryption essay

Encryption involves scrambling data to ensure nobody else understands it, only those with authority. Data can be encrypted in various forms, when it is in rest. When it is in motion or when it in transition. Data can also be encrypted when it is in use. Encryption ensures that data only goes to the owner or the intended to go to. Data at rest is still secure if it is encrypted by ensuring nobody has access to it. When a person steals hard drive information in the hard drive is still secure if the hard drive is encrypted. Encryption provides a privacy of data from second or third parties. It prevents data leak to wrong recipients. There are various types of encryption algorithms. They include blowfish, AES, RC4 DES and Twofish. Encryption needs to be complex and extremely strong to ensure that it very secure. Encryptions that are not strong and complex can easily be cracked through guess work.

Data at rest is protected and encrypted using file system user policy through preventing people who are not authorized to access it to get it. A database has information that has various levels of privacy and is accessed by a variety of users. Databases are very important to business people because they contain sensitive information that can’t be shared. Encryption of a database adds an extra layer of security to make it unusable if the effort to acquire access to raw data is not achieved. Encryption is the strongest data protection strategy for data at rest.

Network access policy also provide encryption to the data through virtual private network which ensures that data does transit to third parties by controlling access of data at transition.Encryption technique rhat is used to protect data at transict is SSL,secure socket laler.Data at rest is easy to secure because you only need to prevent data accessthrough preventing unauthourised personell from coming into contact with the information.

Data at rest and at transit are usually well protected while data at operation is usually less secure. For example, when shopping at an online store. For example, in an on-line shop apps, data showing a shopping list may be encrypted when the data are sent from a shopping cart device to a store server (e.g., in transit), and the corresponding transaction record may be well protected at the store database (e.g., at rest). However, during the shopping time, a user’s input to the shopping list at the local computer may be wide open to third-party through furtively trying to acquire it. Similarly, a approval message received from the store server, which acknowledges and provides details of the transaction, may also be wide open to third-party stealing. In another example, with a remote medical diagnosis application, a patient’s personal and medical data may be well protected by authentication, access control and encryption, when such data is at rest or in transit. Nonetheless, such information when processed and displayed by the application on the local device may be exposed to third-party prying. Accordingly, improved methods for shielding active data are necessary.

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask