Encryption:
The word encryption comes from the Greek word kryptos, meaning hidden or secret. The use of encryption is nearly as old as the art of communication itself.
Encryption is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties.
The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted via the Internet or other computer networks. Modern encryption algorithms play a vital role in the security assurance of IT systems and communications as they can provide not only confidentiality, but also the following key elements of security:
1.Authentication
2.Integrity
3.non-repudiation
TYPES
…show more content…
For this reason, they only protect from snooping on wireless and not after the information leaves the access point onto a wired network.
Cryptography – Benefits:
Cryptography is an essential information security tool. It provides the four most basic services of information security −
• Confidentiality − Encryption technique can guard the information and communication from unauthorized revelation and access of information.
• Authentication − The cryptographic techniques such as MAC and digital signatures can protect information against spoofing and forgeries.
• Data Integrity − The cryptographic hash functions are playing vital role in assuring the users about the data integrity.
• Non-repudiation − The digital signature provides the non-repudiation service to guard against the dispute that may arise due to denial of passing message by the sender.
All these fundamental services offered by cryptography has enabled the conduct of business over the networks using the computer systems in extremely efficient and effective
…show more content…
The network or the computer system can be attacked and rendered non-functional by an intruder.
• High availability, one of the fundamental aspects of information security, cannot be ensured through the use of cryptography. Other methods are needed to guard against the threats such as denial of service or complete breakdown of information system.
• Another fundamental need of information security of selective access control also cannot be realized through the use of cryptography. Administrative controls and procedures are required to be exercised for the same.
• Cryptography does not guard against the vulnerabilities and threats that emerge from the poor design of systems, protocols, and procedures. These need to be fixed through proper design and setting up of a defensive infrastructure.
• Cryptography comes at cost. The cost is in terms of time and money − o Addition of cryptographic techniques in the information processing leads to delay. o The use of public key cryptography requires setting up and maintenance of public key infrastructure requiring the handsome financial
Assessment 3 – Assignment 1 Student Name: John Matanisiga Student ID No: S11124727 1. The difference between these wireless encryption is that WEP is wired equivalent privacy, a default procedure for wired security networks, WPA is an upgrade from WEP, and it is a wireless protected access to networks, whereas WPA2 is modernized into a more secure Wi-Fi from WPA. 2. With Static addressing, a computer (or other device) is configured to always use the same IP address, whereas dynamic addressing, the IP address can change periodically and is managed by a centralized network service.
Hash function is used in message authentication which uses a secret code before hashing so that no one else can modify the message and hash and then can encrypt the message for confidentiality. There are several ways of applying hash for message authentication: 1. One is to apply hash to the message and encrypt it and decrypt it using the same key. 2. Hash is applied to the message and encrypted now the encrypted hashed message and message is sent to the receiver and the receiver decrypts it using the same key 3.
WPA2 –Wi-Fi protected access version 2 This security was made because of the 802.11i wireless security standard. WPA2 is very similar to WPA but it uses AES – advanced encryption standard to encrypt. AES has a 128 bit key whereas DES – data encryption standard which was used before AES has a 64bit key. 64bit keys take a lot less time to break than 128bit key.
Other protocols such as secure socket layer (SSL) which operates at the transport layer enable server authentication as well as client authentication and encrypted communication. Using SSL, we could ensure that the information being sent from our companies’ server and any remote clients is secure. However, it is worth pointing out that SSL has a successor known as transport layer security (TLS). As a successor to SSL functionality, wise TLS is very similar. Some of the improvements made in TLS at least TLS v1.2 include less vulnerabilities compared to SSL as well as new algorithm’s .
Wireless technology is used for data transmission. Wireless technology carries a particular information from one place to another. Examples of wireless technologies are a remote control because while you’re using it, it sends control commands information to your TV making you want to change the channel or record a particular programme. Another example of wireless technology is a wireless sound system because it sends audio information to speakers and headphones. Bluetooth is a wireless technology used for the exchanging of data over short distances.
Security: Files and programmes on a network are more secure as the users do not have to worry about unlawful copying of programmes. PINs can be applied for specific directories to restrict access to unauthorized users.
Information security considered as the procedure of protecting information against unauthorized access, disclosure, disruption, modification, use, or destroyed. In other word information security include defending information whatever the form this data may take. Although each organization employ information security to protect its secret data, but security breaches or identity theft may take place, security breach mean illegal access to defined categories of personal information. In other word it mean illegal access to personal information to use, destroy or amend it (Cate, 2008, p.4).
• Security that all transmissions are protected when being transmitted over the electronic communications
Encryption Security: Hard drive encryption: Without hard drive encryption if a hard drive becomes lost all the information on the hard drive would be viewable by plugging it into another computer. Particularly with a peer to peer network all the other computers on the network will be available if the hacker can access one. Wireless encryption: Wireless encryption is not as secure as a physical network, especially; if that wireless encryption is going to be the main way that strangers will be connecting to the network. All wireless protocols need to be at least WPA2 because of how many tools are out there and older models can be cracked.
That is, the key is delivered outside the network process from which it is being used. 2. Public Key Infrastructure (PKI) is a method of
The authentication of Biometrics (i.e. the real authentication) which is used for identification and controlling the access which can be applied in the computer science. It is can be used in groups to identify the individuals under the surveillance. Biometric identifiers are used to labels the characteristics which can be measurable, the distinctive, and to describe the individuals. Biometric identifiers are being often categorized as behavioral versus physiological characteristics. Physiological are related to define the characteristics and the structure of the body.
the more options there and can be used to violate privacy. Most people consider they have little, if any, control over their personal data. Better encryption and the minimizing of data requirements aids in this goal. PIMS systems are a new technological developing that promises to aid the privacy dilemma. The PIMS system consists of a user’s server, running the services selected by the user, storing and processing the user’s data locally instead of on an online server.
Cryptography basically makes any transaction secure between two parties. Security is very important, because every person with Bitcoins, their Bitcoins, and every transaction is logged to a public ledger visible by every computer on the
"Technology is like art. It is a soaring exercise of the human imagination". Like everything in this world that has its good and bad effects on us, technology does too. How we use technology is important in determining what results it would bring us. Nowadays, technology is heavily used for educational purposes.
In matters of confidentiality, Banking is risky due to the highly sensitive nature of information which is often exchanged, recorded and retained. The purpose of this article is to discuss the clash of confidentiality and disclosure in the banking sector across the globe. The Black’s Law Dictionary defines confidentiality as secrecy or the state of having the dissemination of certain information restricted. Breach of confidentiality, then, refers, to the violation of this trust that has been placed in another in a fiduciary relationship, in this case bank and their customers.