Wednesday, April 17, 2019
Cryptography Essay Example | Topics and Well Written Essays - 1000 words
Cryptography - Essay spokespersonMy organisation is not an exception to this rule and conversations with the IT department head affirmed the use of cryptographic technologies, until now as it established that they were hardly a foolproof defence against unauthorised access.Cryptography is used for the safeguard of all data stored on the organisations networks and servers. As explained by Juels (2003) cryptography involves the encryption of data or their interpretation into sneaking(a), indecipherable code, for the explicit prevention of their interpretation and use if they are accessed without the proper authorization. Not only is it inbuilt for the protection of comp both-related data but, within the context of e-business and e-commerce, imperative for the concealment of information relating to customer payment legal proceeding and credit card details.The purpose of encryption, as defined in the preceding paragraph, is the protection of data as it is transmit across network s. As Oliva et al. (2004) explain, when data is being transmitted across networks, it runs the risk of being intercepted or captured by a third party. If it is encrypted, however, not only is the risk of interception substantially reduced but, more importantly, if intercepted, the deciphering of the data in question is extremely difficult. In other words, if data transmitted over networks is intercepted, the fact that it is encrypted protects it two against tampering and modification, and its subsequent exploitation by the interceptor. Accordingly, and as Matsuura (2006) confirms, the imperatives of exploiting data encryption techniques are inarguable and that any organisation which fails to do so is, to all intents and purposes, acting both irresponsibly and carelessly.The IT department director affirm the use of data encryption technologies. As he noted, whether as regards data stored on the organisations networks or those transmitted across networks, all are encrypted. The decr yption of data was initially enabled through passwords but, a number of incidents prove this an unreliable decryption method. As the IT director noted, while many security systems are designed in such a way that the entire security of the website depends upon secret passwords, the fact is that the password system is pierce with shortcomings. The first deficiency the password system has is that it requires precise recollection of secret information. If the user makes the smallest of errors when entering that secret information, authentication fails. Unfortunately, however, precise recall is not a strong human characteristic and this fact right away conflicts with the requirements of password-secured systems. As a means of bypassing this limitation, people tend to pick and use very simple passwords which move easily be broken by password cracker programmes. Even when people bear in mind the dangers that such programs pose to the security of their passwords, they make the popular m istake of writing their passwords down and conceal them in an easily locatable place by their computer. Those sites which force users to periodically change their passwords for added security have not succeeded in resolving these problems but, rather, increased the need of people to write down their passwords. Additionally, as the number of
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.