Thursday, December 6, 2012

Inormation Security

Information Security: Cryptography University of Phoenix M guileese J. Porchia May 6, 2012 Cryptography Cryptography is an ancient art that is the science of writing in secret codes. The first practise of Cryptography writing dated back to circa 1900 B.C. when an Egyptian copyist intentd non-standard hieroglyphs in an inscription. Today, cryptograph is used when communicating oer an unsecured networktransaction with data and telecommunications. Security Requirements In the article, An Overview of Cryptography, the Arthur stated some warrantor requirements when dealing with cryptography including: * Authentication * Privacy/confidentiality * Integrity * Non-repudiation I have been working in the security field for over 9 years and I flush toilet validate to the requirements specified in this article to ensure unspoilt security requirements` of using cryptography. It is a very important instrument to prevent the enemy from finding out Top conundrum information about a job venture or information that could potentially harm the US. The above security requirements ties into the use of three encryption techniques (hash function, secret key, public key) to form a secure transmission.
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
Security and the Future In todays gentleman where technology is continuing to expand day by day from e-mail to cellular communications, from secure Web access to digital cash, cryptography has become an essential part of todays information systems. In the article, Cryptography, Security and the Future, the Arthur states how billions of dollars are dog-tired on computer security. The difference is some are hearty and some have security holes and thats why its important to have experts to come out and train and in like manner ensure that your business or job have the decorous and correct software. Conclusion In conclusion the Arthur in both articles explained the pros and cons of dealing with cryptography and the necessary precautions to take to ensure a golosh and secure way of transferring sensitive... If you want to get a all-embracing essay, order it on our website: Orderessay

Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.

No comments:

Post a Comment