Cryptography and organizational data security

Cryptography and organizational data security

Cryptography is the art and science of using complex logic and mathematics to come up with encryption methods that are strong enough to make private information or data in organizations inaccessible to third parties or the public (Stallings, 2006). The encryption methods involve hiding the meaning of data using codes. This is because, after the organization’s human resources, data is a very important asset. As risk management and security are data centric, the organization’s central efforts are geared towards the protection of its systems and networks in the attempt to attain three objectives: availability of data, integrity and above all confidentiality. It is also apparent that no infrastructural security protection is 100% effective (Kahate, 2013). It thus becomes vital for the organization to formulate a layered model of security to implement an effective data protection measure that is wrapped around any sensitive information; encryption. However, this encryption does not become a security panacea, since it does not bring solutions to all the data-centric issues of security in the organization. Rather, it makes a better control among the many that are the firm can apply.

When the networks in a firm are not encrypted or secured, the data is exposed to all sorts of vulnerabilities that if they are not addressed, they lead to risks. Some of the vulnerabilities involved include; data loss, hours or days during site downtime and time lost by staff in rebuilding a server when it has been interfered with (Stallings, 2006). Cryptography aspect thus comes in to protect the data from third parties such as hackers, competitors or unwanted people who are not part of an organization. It ensures that customer details, sales figures, financial data and other key company information are secure.

From the list of words given, the short message is as follows; ‘congratulations code breaker.’

References

Kahate, A. (2013). Cryptography and network security. Tata McGraw-Hill Education.

Stallings, W. (2006). Cryptography and network security: principles and practices. Pearson           Education India.

Response to answer one

It is true that cryptography forms part of the common body of knowledge (CBK) security domains. It is also a fact that firms need this security domain to disguise their data and information of customers for integrity, authenticity, and confidentiality. To achieve this, data needs to be validated and encrypted. Decrypting allows those authorized to access the encrypted data. Cryptography can provide non-repudiation.

I support the fact that as business went online, electronic transfer of funds integrity surpassed confidentiality when it comes to the application of cryptography. Thus people rely on the domain as long as they continue to transmit information electronically using e-mails, e-commerce, cellular phones, and ATMs.

The decrypted code is true; ‘congratulations code breaker.’

Response to answer two

I agree with your point that cryptography addresses vulnerabilities of information technology though not all of them. It is true that this domain is embedded into customer data as it protects the information related to authentication, electronic stamping, network communications and electronic transactions.

Through the use of authentication and digital signatures in cryptography, it becomes certain that particular messages come from such a messenger. The public key of the recipient helps decrypt the encrypted message using the private key from the sender. Secrecy and confidentiality are thus maintained.

I also agree that a secure socket layer (SSL) provides security of data between TCP/IP and HTTP, FTP, NNTP and Telnet application protocols. It supports the integrity of messages, server and client authentication, and data encryption. It ensures that these key security features are observed since data is accessible to the right persons and barred to the public.

Your point on integrity is clear in that it involves accuracy, consistency, and trustworthiness during data life cycle. It is thus key to ensure that it is not altered or changed in all the steps by authorized people. This is done by maintaining hardware, doing repairs when necessary and avoiding any conflicts in software.

I also agree to the code; ‘congratulations code breaker.’

The post Cryptography and organizational data security appeared first on My Assignment Online.

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
šŸ‘‹ Hi, how can I help?
Scroll to Top