Once the message is encrypted and sent to the receiver, they use their private key to decode the message. Only the private key is able to decode. Not even the public key is able to decode what it just encoded (Baase, 95). If the encrypted document fell into the wrong hands, that person would have no way of deciphering it. Only the person possessing the private key has the ability to read the message.
Hacking does not have to be a criminal activity; however, a computer hacker can be someone who knows how to avoid the limitations of a device or a piece of software. Ethical hackers often break into computer systems with permission to find vulnerabilities and improve security. Hacking is a crime when the hacker access systems without the owner's permission. Hacking a device or system can refer to altering or improving it, without any suggestion of illicit access. An example of such a hack can be turning off the Wi-Fi on your laptop to save the battery.
Security Methods to Protect Your Privacy Privacy and security issues have become one of the top concerns among computer users in today’s market. It has become a game of survival of the fittest in protection of your security. The only true way to defend yourself is knowledge. You should prepare your self against hackers, spammers and potential system crashing viruses and web bugs. Lets focus on how you can protect yourselves from the would be thieves.
Encryption Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for maintaining your privacy and the security of important information.
Users do not want anyone to put viruses on their computer or anything that may damage the computer. Some business will only allow strict acce... ... middle of paper ... ...spyware or antivirus. Also, these programs can remove malware and malware can be detected. Malware is any activity of a software that damaging, or block activity to a service of a computer system. Types of malware are spyware, keystroke loggers, worms and Trojan horses.
Asymmetric and Symmetric both have their disadvantages and advantages. Asymmetric is known as public key encryption. This method of encrypting messages makes use a public key and a private key. The public key is made publicly available and is used to encrypt messages by anyone who wishes to send a message to the person that the key belongs to. The private key is kept secret and is used to decrypt received messages (Arthur Conklin, 2010).
The other method of securing files is by encrypting the information in the files using an Encrypting File System (EFS), which employs public key encryption privileges (Strengthen Your Users' File Security, 2003). A firewall prevents access to an internal system from the outside the company via the internet on any open ports. A firewall will also prevent internal network users from accessing certain internet sites which could be dangerous or offensive (Shay, 2004). The firewall acts at the OSI model's layers three and four by searching packets for certain types of headers (Shay, 2004). So, firewalls differ from file security because anyone inside the company can theoretically access files behind the firewall, while file security provides internal security against a company's own workers.
PUBLIC KEY (ASYMMETRIC) ENCRYPTION Asymmetric Encryption is used to protect the data while in movement. Asymmetric Encryption is also known as Public Key Encryption. It uses two related keys, a public key and a private key which is not shared with anyone. This pair of keys are developed by mathematical methods which can be solved in one direction. So anyone can encode a data using the public key but only the user with a private key can decode that specific data.
Invasion of Privacy on the Internet Invasion of privacy is a serious issue concerning the Internet, as e-mails can be read if not encrypted, and cookies can track a user and store personal information. Lack of privacy policies and employee monitoring threatens security also. Individuals should have the right to protect themselves as much as possible from privacy invasion and shouldn't have to give in to lowered standards of safety being pursued by the government. Encryption is the best and most convenient way to ensure that e-mails and other files transferred via the Internet are kept private during transfer. The widespread use of strong encryption technology is essential to protect consumers and businesses against spies, fraud, and theft over the computer networks used in electronic commerce.
Symmetric and asymmetric are two examples of cryptographic systems. Symmetric systems use the same key to encipher and decipher. Asymmetric systems generate and use different keys to encipher and decipher a secure key pair. With this key pair, consisting of a public key and a private key, only one key can decipher what the other enciphers. Merely knowing one key does not make it very likely that someone will be able to figure out the other key.