New England College Data Encryption Cyber Security Question

User Generated

nivanfuerqr

Computer Science

New England College

Description

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.

Write in essay format not in outline, bulleted, numbered or other list format.

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached. Please let me know if you have any questions or need revisions.

Data Encryption


In this digital world, data is in large quantities and is non-redundant.



All that data needs to be stored, transferred, and its access secured within the
application's scope.



There is a need to use data encryption



Some of the common data encryption techniques used are SHA 256 and AES 128.



A quote by Snowden “Encryption works. Properly implemented strong crypto systems
are one of the few things that you can rely on. Unfortunately, endpoint security is so
terrifically weak that NSA can frequently find ways around it”



A quote by Scott “When flimsy cyber defense fails, Format Preserving Encryption
prevails”



With the quotes and the explanation of the data encryption process, it is evident how
critical it is to ensure data security.



It is important to encrypt data at rest and data in transit.



Data should be encrypted in the current digital world to maintain its security, make it...


Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags