2.9.1 What is Encryption?
Basically encryption is the process or method of encoding messages or information in a way that only authorized parties can get access to it. Encryption doesn't prevent hacking but it definitely reduces the chances that the hacker will be able to read the data that is in encrypted form. In encryption, the message or information that is referred as normal data or plain data is encrypted using an encryption algorithm, converting it into cipher text. This is generally done with the use of a key, which specifies how the message is to be encoded. Any person who can see the cipher text or encoded plain text should not be able to determine anything about the original message. An authorized user is able to decode the cipher text using a decryption algorithm, that requires a secret decryption key, that the person do not have access to. For some reasons like technical, an encryption scheme usually should have a key-generation algorithm for the randomly produce keys. There are various algorithms that we use to encrypt and decrypt data on cloud.
2.9.2 Types of encry...
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
All over the world there are millions of people use credit card and on-line shopping. Every individual gets different numbers for credit card and for transcription of on-line-shopping. Where did all this number come from? Are the numbers in order? No, those numbers are made by RSA algorithm.
Big Brother's surveillance state is compared to phones in the modern world. The book features telescreens that are dual-purpose devices that play a stream of televised propaganda and record everything going on. Telescreens are present in upper and middle-class homes, but not in the prole homes, since the government doesn't care what the poor people are doing. Today, we have our own telescreen devices that we carry around everywhere with us - cell phones. Like telescreens, cell phones can even be used for government surveillance. As the FBI proved in 2006 when they hacked into a mobster's phone to turn the mic on and record to look at the internet use and warrantless wiretapping controversies. The creation of a state of a never ending war and fear induces people to surrender their rights and liberties that enables the imposition of the surveillance state, “Both rely on the existence of a technological system with the capacity to monitor every citizen’s actions and words (Rohde, 2017).” In 1984, Orwell shares the joyful relationship of Winston Smith and Julia in their secret haven to remind readers what has been lost in society, “He wished above all
What concerns the government of the United States most is the security of the critical infrastructure from the cyber threats. The nation is depending heavily on the technology in most of its critical sectors to keep it up and running. Thus, this makes its more vulnerable to cyber-attacks from outsiders and insiders. Therefore, its protection must be a priority.
Since the industrial revolution, communications technology has improved at an alarming rate. From the invention of the printing press to the rapidly expanding internet, it becomes easier to communicate with others every day. One downfall of this revolution is that it is much more difficult to keep confidential papers documents secure. In such a volatile environment a document can be stolen, scanned, and sent to the rest of the world within a span of five minutes. Once a person gets a hold of this information they can read it if it is in their own language or get it translated if it is in a foreign language. If a picture, symbol, or badge, is exploited in the same manner through the internet, it will not have such a crippling effect. Although viewers will be able to see the illustration, they will only derive from it whatever values or characteristics they associate the symbols with. However, the people who are affiliated with the image derive more important facts from it. They might associate the illustration with historical meaning, personal stories, or how the image was created. Literate means of communication are imply universal understanding while symbols have the ability to convey different levels of meaning and comprehension to different groups of viewers. This dichotomy creates different niches for literate and visual means of communication to be used in. If material is meant to be understood universally and to convey the same meaning to all viewers than literate means of communication should be employed. If certain details are to be communicated to a select group of individuals, then symbols are a more effective way of ensuring secrecy. Symbols indicate the need for communication and yet conceal the details and innermost aspects of its contents (Religious).
Asymmetric Key Encryption methods are DSA, Diffie Hellman, RSA, Elliptic Curve and DSA. Asymmetric Encryption
Benjamin Franklin once said: “ They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.“ Today, we may agree or disagree with Franklin’s quote, but we do have one thing in common: just as Franklin, we are still seeing freedom vs. security as a zero-sum game – one where one can gain only at the expense of another and where the two cannot possibly coexist. However, this is not necessarily the case. There does not have to be necessarily a trade-off between privacy and security; the proper balance is the one where neither security nor privacy suffers from both of them being present in our daily lives.
Data Encryption is from the cryptography science, which includes coding and decoding of message to protect the safety. Development computer technology makes the encryption even more complicated. The ability for people to break codes is increasing, so are the ability to guard the codes. Many encryptions are available now. They were developed by some hi-tech company and sold, or you can choose some free service. Actually, when you are using the web browsers, emails, or even the basic system, your information has been automatically encrypted.
Source B argues that encryption prevents crimes from being solved, which includes a father of six who was shot dead and the killer is now on the run (Source B). The article describes that there were two smartphones, one phone running on Apple’s operating system, and one on google’s Operating system. These phones seem to hold the answer to the crimes, but they can not be unlocked because the phones have been encrypted so not even the companies can unlock them. By having these phones encrypted, this could lead to this crime not being able to be solved and six kids not knowing who killed their father. Encryption adds an extra, very difficult, step that hinders the government's ability to be able solve crimes quickly and efficiently.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
The protection of data being transferred between ATMs and the bank, and the use of cell phones is the most common everyday encounter with encryption. To encrypt and decrypt information a cipher is used. In a cipher there is a set of well-defined steps that can be followed to encrypt and decrypt messages. The use of a cipher relies greatly on the use of an encryption key. The key may contain any auxiliary information added to the cipher to produce certain
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
Encryption: - Data encryption is the best way to reduce risks associated with misplaced, lost or stolen data.
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.