Data Encryption
Shiqi Luo(701794770)
The definition and importance of data encryption
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
Data Encryption is from the cryptography science, which includes coding and decoding of message to protect the safety. Development computer technology makes the encryption even more complicated. The ability for people to break codes is increasing, so are the ability to guard the codes. Many encryptions are available now. They were developed by some hi-tech company and sold, or you can choose some free service. Actually, when you are using the web browsers, emails, or even the basic system, your information has been automatically encrypted.
Basic principle
The basic of data encryption is cryptography science. Cryptography has a...
... middle of paper ...
...tion systems. Some problems come out such as this case, which involved argue about Fifth Amendment. It’s kind of an alarm to remind people the complex situation of high-technology. The influence of encryption is expanding. We’d better get to know it and use it properly, protecting ourselves’ information secure.
Reference
1. CES Communications. "What is encryption?" http://www.cescomm.co.nz/about/encryption.html 2. The LEDA User Manual. "Symmetric key cryptography" http://www.algorithmic-solutions.info/leda_manual/Symmetric_Key_Cryptography.html 3. Jeff Tyson. “How encryption works” http://computer.howstuffworks.com/encryption8.htm 4. Martin, Frank. "SSL Certificates HOWTO." http://tldp.org/HOWTO/SSL-Certificates-HOWTO/index.htm
5. Politics and policy “Encryption and the Fifth Amendment”
http://politicsandpolicy.org/article/encryption-and-fifth-amendmentl
Communication surveillance has been a controversial issue in the US since the 1920's, when the Supreme Court deemed unwarranted wiretaps legitimate in the case of Olmstead v United States. Since telephone wires ran over public grounds, and the property of Olmstead was not physically violated, the wiretap was upheld as lawful. However, the Supreme Court overturned this ruling in 1967 in the landmark case of Katz v United States. On the basis of the fourth amendment, the court established that individuals have the right to privacy of communication, and that wiretapping is unconstitutional unless it is authorized by a search warrant. [Bowyer, 142-143] Since then, the right to communication privacy has become accepted as an integral facet of the American deontological code of ethics. The FBI has made an at least perfunctory effort to respect the public's demand for Internet privacy with its new Internet surveillance system, Carnivore. However, the current implementation of Carnivore unnecessarily jeopardizes the privacy of innocent individuals.
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
Edward Snowden is America’s most recent controversial figure. People can’t decide if he is their hero or traitor. Nevertheless, his leaks on the U.S. government surveillance program, PRISM, demand an explanation. Many American citizens have been enraged by the thought of the government tracing their telecommunication systems. According to factbrowser.com 54% of internet users would rather have more online privacy, even at the risk of security (Facts Tagged with Privacy). They say it is an infringement on their privacy rights of the constitution. However, some of them don’t mind; they believe it will help thwart the acts of terrorists. Both sides make a good point, but the inevitable future is one where the government is adapting as technology is changing. In order for us to continue living in the new digital decade, we must accept the government’s ability to surveil us.
On 5 October 2009, computer equipment from a network data closet was stolen from BCBST. The items stolen were 57 unencrypted hard drives which contained over 300,000 video recording and over one million audio recordings. According to Whitman & Mattord (2010), confidentiality, integrity, and availability makes up the C.I.A triangle which is the basis of Committee on National Security model for information security, an industrial standard, (Whitman & Mattord, 2010). Confidentiality can be a synonym for encryption but also means only the people with the correct permission can access the information. One of the major security issue is the hard drives were not encrypted. The hard drives should be encrypted to prevent people from reading the information the computer. Software can be purchased which will encrypt files on hard drive with such as Folder Lock, SensiGuard, Secure IT, and more. There are open source encrypting software which are free for use which could have been used. If the hard drives were not needed, the data should hav...
Ultimately it comes to the determination of that which is considered to be “reasonable”. Some will assert that it is reasonable to relinquish some degree of our liberty to ensure safety. We must surely be cautious as to how we reveal the criminals amongst us. But they must be revealed. And the criminal will continue to endeavor to undermine those attempts to be revealed and apprehended through the utilization of emerging technologies. The very same technologies that are utilized lawfully by society. Therein lies the conundrum.
Ever since day one, people have been developing and creating all sorts of new methods and machines to help better everyday life in one way or another. Who can forget the invention of the ever-wondrous telephone? And we can’t forget how innovative and life-changing computers have been. However, while all machines have their positive uses, there can also be many negatives depending on how one uses said machines, wiretapping in on phone conversations, using spyware to quietly survey every keystroke and click one makes, and many other methods of unwanted snooping have arisen. As a result, laws have been made to make sure these negative uses are not taken advantage of by anyone. But because of how often technology changes, how can it be known that the laws made so long ago can still uphold proper justice? With the laws that are in place now, it’s a constant struggle to balance security with privacy. Privacy laws should be revised completely in order to create a better happy medium between security and privacy. A common misconception of most is that a happy medium of privacy and security is impossible to achieve. However, as well-said by Daniel Solove, “Protecting privacy doesn’t need to mean scuttling a security measure. Most people concerned about the privacy implications of government surveillance aren’t arguing for no[sic] surveillance and absolute privacy. They’d be fine giving up some privacy as long as appropriate controls, limitations, oversight and accountability mechanisms were in place.”(“5 Myths about Privacy”)
Recent advancements in technology have had a huge impact on the current criminal justice system. These new developments have made it easier for those in the field to track down criminals and help provide better evidence to support their cases. Things such as fingerprint databases, DNA testing, GPS tracking, and many other things have made it easier for prosecutors or defendants to prove their cases in court. This is very beneficial because with this new wave of technology officials are now able to provide more reliable and credible evidence in court. This current upsurge of technology will help benefit a lot people in the field. People such as law enforcement, falsely accused criminals, prosecutors, defendants, judges, the list just goes on and on. Technology has been has had a major impact on the criminal justice system, it is now been made easier to track down and catch criminals and made it so that the evidence provided at court is more reliable and credible.
Technology and the Invasion of Privacy As citizens of America we are all entitled to our rights of privacy. When something threatens this guaranteed privacy we tend to take extra precautions to prohibit prolonged violation. As the advancing world of technology continues to grow and expand, so do the amount of cases involving privacy invasion. Technology drives these privacy-invading crimes; however, crime also drives technology, creating a vicious cycle.
As technology as advanced, so has our society. We are able to accomplish many tasks much easier, faster, and in effective ways. However, if looked at the harmful impact it has had on the society, one can realize that these are severe and really negative. One of the main concerns is privacy rights. Many people want that their information and personal data be kept in secrecy, however with today’s technology, privacy is almost impossible. No matter how hard one tries, information being leaked through technological advancements have become more and more common. With personal information being leaked, one does not know exactly how the information will be used, which validates the statement that privacy rights have been diminishing and should be brought to concern. Many people do not realize that their information is being used by third-parties and to consumer companies. In conclusion, technology has had a significant effect on privacy
Technology is constantly changing, growing, and evolving but with each change in technology we risk our own privacy. With each new update we get we are told it improves our network or life but in reality it makes it easier to invade our privacy just like in the novel 1984 by George Orwell. There are many parallels between 1984 and our present day like the over watchful eyes of the government for our own good.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
Despite the numerous advantages offered by cloud computing, security is a big issue concerned with cloud computing. There are various security issues and concerns associated with cloud computing, among them being phishing, data loss and data privacy. There are different mitigation measures that cloud pioneers are currently using to ensure data stored in the cloud remain secure and confidential as intended. Encryption is one mitigation method used to ensure security in cloud computing. According to Krutz and Vines (2010), encryption involves coding of the data stored in the computing cloud such that hackers cannot gain access to the data. Data encryption seems to be the most effective method of ensuring security in computing (Krutz and Vines, 2010). However, it is of paramount importance to note that encrypted data is usually difficult to search or perform various calculations on it.
Nowadays, the information is the most treasured asset in an organization, due to it along with the experience represents the input necessary to take appropriate decisions and consequently to have success in the business. Almost all the information and knowledge related with the processes business, goods and services offered by a company, is processed, managed and stored through technology and information systems, thus the security of information has become increasingly important and plays a critical role in the enterprise government.
encryption mainly is the scrambling of the content of data, such as text, image, audio, video and so forth to make the data unreadable, invisible or incomprehensible during transmission. The goal is to protect the content of the data against the attackers. The reverse of data encryption is data decryption, which recovers the original data.
Everyday information gets into the wrong hands. This can lead up to millions of dollars lost for a company and its reputation in this global environment. It only by knowing the different encryption methods you hope to protect your reputation and assets. I will discuss a possible solution to protect your information and explain the advantages and disadvantages of asymmetric or symmetric keys.