Preview

Computer Security, Defines encryption and explain how it is used to protect transmission of information

Powerful Essays
Open Document
Open Document
877 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Security, Defines encryption and explain how it is used to protect transmission of information
1

Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.

The other method is Transposition (rearrangement characters) which is the encryption process in which units of the original plain text (usually individual characteristics) are simply moved around; they appear unchanged in the cipher text for their relative location.

Study Case (Bank of Shenandoah Valley)

While both encryption and authentication method are providing some measures of security, the implementation of security itself has totally a different approach. Before any methods chosen, the two most important factors in security implementations are having to be determined. The level of security needed and the cost involved, so the appropriate steps can be taken to ensure a safe and secure environment. In this case Bank of Shenandoah Valley is in type of business which a high level of security is required, therefore, I would suggest the use of encryption method with a complex algorithm involved. Although an authentication method is a secure method as well, is not as complex as encryption method of complex algorithm since it has been used in military during the war where a high levels of security are a must. During the war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. This is a perfect example of how reliable an encrypted message can be while used within its appropriates

You May Also Find These Documents Helpful

  • Powerful Essays

    Encryption prevents somebody using eavesdropping technology, such as a(n) ____, from capturing packets and using data in the packets for malicious purposes.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Mis589 Wk7 Mini-Cases

    • 487 Words
    • 2 Pages

    Belmont State Bank is a large bank with hundreds of branches that are connected to a central computer system. Some branches are connected over dedicated circuits and others use the dial-up telephone network. Each branch has a variety of client computers and ATMs connected to a server. The server stores the branch’s daily transaction data and transmits it several times during the day to the central computer system. Tellers at each branch use a four-digit numeric password, and each teller’s computer is transaction-coded to accept only its authorized transactions. Perform a risk assessment.…

    • 487 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Navajo Code Talkers

    • 993 Words
    • 4 Pages

    During War World II, the United States needed a secure and immediate way to transmit messages and communicate by telephone and radio in a code that could not be broken by the Japanese. Cryptography is the science or study of writing or solving codes; which made this war effort difficult to accomplish. America succeeded this goal with a code that was not based on any type of science, mathematics, or substitutions, but on a language. This system of massaging and communication was known as the Navajo code and was the most sufficient, secure, and fastest to date.…

    • 993 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This can be illustrated by the process of Steganography and encryption using the operating system functions. Steganography is a method of hiding the presence of a message or a file inside another much larger file or message without the forensics knowing it is there in the first place (Westphal, 2003). It is a deliberate act of keeping a message or data hidden. One good example would be hiding pornographic images inside an image…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Technology Perks

    • 1344 Words
    • 6 Pages

    Bank checks best method of input is the magnetic ink character recognition because of its unique way of recognizing the check information. The magnetic ink character recognition depict…

    • 1344 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    References: D 'Arcy, J., Hovav, A., & Galletta, D. (2009). User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach.. Information Systems Research, 20(1), 79-98.…

    • 1465 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    The cleaning staff was scene reading documents that were thrown in the trash while performing their cleaning duties. Technically the cleaning staff was not violating any laws because the printouts were tossed into the trash which makes them public information. With that being said the cleaning staff should be…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Good Essays

    2) Encoding. This usually is in the form of a language (either written or verbal) that the receiver will be able to understand.…

    • 1331 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Encoding : This is the process of converting the information into a form that can be correctly decoded at the other end by…

    • 2906 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Substitution and transposition ciphers are two categories of ciphers used in classical cryptography. Substitution and transposition differ in how chunks of the message are handled by the encryption process. Substitution ciphers encrypt plaintext by changing the plaintext one piece at a time. Transposition ciphers encrypt plaintext by moving small pieces of the message around. A transposition cipher doesn't change the characters in the plaintext when it generates the cipher text, it just re-arranges them. It applies some kind of permutation function to the text to produce a re-arrangement, which can be reversed by knowing the secret to the permutation. In this report, I have chosen columnar transposition cipher.…

    • 266 Words
    • 2 Pages
    Good Essays