Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
The importance of computer security
The importance of computer security
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: The importance of computer security
Information security plays a central role in the deployment of modern communication systems. The most important objectives of information security are authentication, confidentiality, data integrity and non-repudiation. Confidentiality ensures that information is accessible only to those authorized to have access. Authentication is the process proving the identity that assures the communicating entity is the one that it claimed to be, this means that the user or the system can prove their own identities to other parties who don’t have personal knowledge of their identities. Data integrity ensures that the received information has not been altered in any way from its original form. Data integrity safeguards the accuracy and completeness of information and processing methods. …show more content…
The word cryptography comes from the Greek word "Kryptos", that means hidden, and "Graphikos" which means writing. Cryptography or communication by using secret code was used by the Egyptians some 4000 years ago. However, the science of cryptography was initiated by Arabs since 600s. Cryptography becomes vital in the twentieth century where it played a crucial role in the World War I and II. Cryptographic technique is an effective method for protecting many private and public data transported in the network of global information communication. It is the process of changing information such as e-mail, banking data, and other confidential information, into an unreadable form that only the person intended to receive it can understand the information. There are two types of cryptographic schemes in use today: private key or secret key (also known as symmetric) cryptography and public key (also known as asymmetric) cryptography. Symmetric key cryptography uses the same key for encryption and decryption. Another type of encryption method, asymmetric or public key cryptography uses different keys to encrypt and
9 Apr. 2014. The 'Standard' of the 'Standard'. Web. The Web. The Web.
N.p., 6 Mar. 2014. The 'Standard' of the 'Standard'. Web. The Web. The Web.
N.p. 17 Mar. 2014. The 'Standard' of the 'Standard'. Web. The Web. The Web. 8 Mar. 2014.
The 'Standard' of the 'Standard'. Web. The Web. The Web. 13 Nov. 2010.
The Web. 18 Mar. 2014. The 'Standard' of the 'Standard'.
(2010). The 'Standard' of the 'Standard'.
N.p., 1 Apr. 2014. The 'Standard' of the 'Standard'. Web. The Web. The Web.
The Web. 21 Mar. 2014. The 'Standard' of the 'Standard'.
The 'Standard' of the 'Standard'. 4 April 2012. http://www.sffworld.com/brev/si184p0.html.
PKC is the enabling technology for all Internet security and the increasing use of digital signatures, which are replacing traditional signatures in many contexts. However, RSA is better than PKC because RSA doesn’t need digital signature. As a result, the RSA algorithm turned out to be a perfect fit for the implementation of a practical public security system. In 1977, Martin Gardner first introduced the RSA system. After 5 years, company RSA used secure electronic security products. Nowadays many credit companies of all over the world use the RSA system or a similar system based on the RSA system.
My house infrastructure is good compare to outside environment for carrying my good health to succeed in my daily goals.
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Cryptography provide many thing for the everyday person such as authentication, time stamping, electronic banking and secure network communication. Authentication is a very important application of public key encryption. According to Simpson authentication ensures the message is from a certain person. Ensuring a message is from who it is said to be from is important in making sure information is passed along to the correct people. As well as ensuring