StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Technology of Information Security - Essay Example

Cite this document
Summary
Technology of Information Security Name Institution Technology of Information Security Introduction The use of cryptography is a necessity for the consequence of the revolution of information in the world today. Electronic communications is widely used and to make conversations very confidential, cryptography gives the solution for the problem though it has been majorly spawned by a serious debate (Mel and Baker, 2000)…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.9% of users find it useful
Technology of Information Security
Read Text Preview

Extract of sample "Technology of Information Security"

Download file to see previous pages

As technological advancement keeps coming, several reliable cryptography methods are continuing to emerge. Data encryption has a number of advantages and disadvantages. Its disadvantages come mainly because the technology is sometimes not used as required. Cryptography is a very powerful and important technology that can be used to protect information sent to emails and all financial based transactions. Information needs to be shared in order to make various decisions that govern various activities.

For this reason, information should be as confidential as possible for sustainability and accuracy of its use. Data encryption techniques offer a solution for the protection of information against all third parties. The techniques are basically needed for information to be encrypted whereby one party shares its information with a recipient. On the other hand, enemies can hack into people’s accounts and plot violence against a country with knowledge of cryptography. Some governments want to restrict its use for fear of criminals and spies using the technology for their good and to the disadvantage of the nation.

How Encryption Technique works Encryption is a process whereby messages are converted into a form that has been created that without decrypting or deciphering, they cannot be read. Encryption uses a systematic procedure or algorithm which converts messages or data to their original form. The cryptologists are engaged in competition that will never end in a bid to create better and stronger techniques that will be used by parties to protect their data. Although other methods of deciphering exist, the recent systems are more powerful to an extent that they are almost unbreakable even with the use of powerful computers.

The new cryptosystems use mathematical formulae that are very complex and which effectively resist breakthroughs. The Use of PGB There are several popular encryption systems used in the world today. They include the data encryption standard (DES), pretty good privacy (PGB), and the Rivest Shamir, Adleman (ARS) system. The DES system uses a single key and it has been developed in the USA. The RSA on the other hand uses two keys and was generally made just for the public use and named after the people who developed it (Frazier2004).

Pretty Good Privacy (PGB) helps internet users to keep all their communications private. It is a two key system which enables a computer to send encrypted messages using a chosen private key that only the sender knows. All the computers that will receive the email message are given a copy of the private key which later establishes the message sender. When using the public key method, the one who sends the message and the receiver are both able to authenticate each other and also protect the message which is usually secret.

Advantages of Encryption Techniques Encryption techniques make information unreadable to people who are not supposed to access the information. This is very important to many organizations because no third party can access information without being allowed to do so by the sender. The information cannot be accessed even through the administrator’s server leave alone other computers. This improves loyalty and secrecy in the organization or any governments in the world today. Data encryption is regarded as a national issue by governments because it majorly

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Technology of Information Security Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Technology of Information Security Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1453415-technology-of-information-security
(Technology of Information Security Essay Example | Topics and Well Written Essays - 750 Words)
Technology of Information Security Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1453415-technology-of-information-security.
“Technology of Information Security Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1453415-technology-of-information-security.
  • Cited: 1 times

CHECK THESE SAMPLES OF Technology of Information Security

Information Technology Security

With the increased usage of computers and the Internet, there is a lot of movement data and personal information.... Another very common fraud is unauthorised access to information where the criminals hack into customers accounts to make changes or misuse the accounts.... Describe and analyse the range of computer related crimes and, based on this analysis, offer up some effective… technology is shaping our world....
15 Pages (3750 words) Essay

Information technology director security plan

If I was an information technology director, I would: Ensure the protection and management of information technology resources.... security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased.... hellip; security is not primarily a technical or technological issue but is a management issue as the incidents of lax security and bank failures due to redundancies and other management errors have increased....
1 Pages (250 words) Coursework

Information Technology- Security

International Conference on information security and Assurance (ICISA) , & Park, J.... Advances in information security and its application: Third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009: proceedings.... Information assurance describes the measures that organizations take to protect and restore the quality of information in a bid to enhance the reliability of its sources.... According to Herold & Rogers (2011), the concept has many dimensions that include completeness, validity,… In organizations, the protection of information from unauthorized access and alteration is the main aim of information assurance....
2 Pages (500 words) Research Paper

Information Technology Security Risk

It is evidently clear from the discussion that threats can provide damage to the confidentiality, availability, and integrity of information present in the information systems.... They explore opportunities for security breaches to cause confidential data invasion via unauthorized access, amendment of data, removal of information from information systems.... This research will begin with the statement that threats are defined as the probable network security breach which may occur in the future and will harm the network, as well as Information systems....
13 Pages (3250 words) Research Paper

Information Technology: Surveillance Security

Organizations require advanced protection and security from these threats and vulnerabilities.... security is mandatory to protect anything that needs to be protected as 'www.... A definition associated with information and communication technology will demonstrate the concerns related to network communication privacy, confidentiality of data over the network, accessing unauthorized classified data, access to prohibited network domains and utilizing the Internet for concealed communication (Network security....
8 Pages (2000 words) Assignment

Information Technology Security

Criminal justice has had to catch up and develop crimes and sanctions based on the usage of information communication technology.... The discussion that follows will outline some of the challenges of information technology security.... There are four broad methodologies that can be used and these forms the four common offenses as regards attacks on the systems of information of an organization.... This coursework "Information Technology security" describes different types of attacks and the main aspects of security....
7 Pages (1750 words) Coursework

The InnoSensors Technology Company

… The paper "information security: InnoSensors Technology Company" is a worthy example of a case study on information technology.... nbsp;This research is about information security and specifically narrows down to the InnoSensors technology company that is about to launch a new health monitoring device and the aim of the research is to develop a security mechanism that is appropriate for the company.... The paper "information security: InnoSensors Technology Company" is a worthy example of a case study on information technology....
12 Pages (3000 words) Case Study

Understanding Information Technology Security

A sender of information should understand that information that is not encrypted can be monitored and captured within an online platform.... "Understanding Information Technology security" paper focuses on the use of encryption that assures one using either of the operating systems in place of immediate security and protection.... It is important to note that encryption is a mechanism that uses a mathematical formula known as a cipher and a consequent key that is needed for converting readable information that is presented as plain text into data that cannot be comprehended or rather ciphertext (SANS, 2011)....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us