Description
I want to write about:
important of encryption (2-3) pages
use software encryption problmes1-2 pages
use hardware encryption problems 1-2 pages
combine software and hardware encryption advantages and disadvantages 2-3 pages
- Must include valid scholarly sources like IEEE. and should from 2017 til 2022 ONLY. Please avoid .com references. and please attach the paper here

Explanation & Answer

View attached explanation and answer. Let me know if you have any questions.
1
Cyber Security Project
Student’s Name
Institutional Affiliation
Instructor
Course
Date
2
Cyber Security Project
Importance of Encryption
Data encryption encompasses a process of changing vital information to make it
unreadable by unauthorized and unintended parties. It could involve protecting data with
cryptography, usually by leveraging a scrambled code, and only the individuals with the
decoding key can read the information. Data encryption may incorporate two types of systems
for data scrambling that include symmetric encryption, largely used to prevent data access by
cybercriminals, and asymmetric. Notably, companies can use a range of encryption standards, for
instance, the triple data encryption standards, RSA, and the Advanced Encryption Standard
(AES).
There are various benefits of data encryption, among them the potential to use it across a
range of devices. Technological evolution has allowed for the use of modern encryption
technology on various tech devices as they have high compatibility with contemporary
technological solutions compared to conventionally developed devices. Entities using encryption
have the benefit of subscribing to the free and paid data encryption methods. There is also an
emerging trend in the use of multi-device encryption, which provides a range of alternatives for
companies to choose from. Besides, data encryption enables entities to avoid regulatory fines
that could be imposed in the aftermath, of data loss (Munn et al., 2019). According to research,
different industries have specifically tailored policies governing data encryption, and in others,
data encryption is a mandatory, rather than an optional requirement, for instance, the applicable
patient privacy laws in the health care sector. Non-compliance in such industries attracts hefty
fines, which represents genuine concerns. In the long-term, non-compliance may attract bad
publicity and reduced profitability.
3
Data encryption technology helps protect remote workers by staying safe, as they usually
store sensitive and valuable data on their devices, with the respective employer companies
having little control over how the information is accessed and shared. Data encryption plays a
vital role in such a scenario, as there are multiple incidences involving data loss, and/or damage
especially in the remote setting where there lack of adequate oversight and control of the data
access and use. Studies show data breach risks to be higher when people work remotely.
Examples of solutions that would help increase data privacy and security for remote workers
include using virtual private networks (VPN), for instance, when they use unsecured public WiFi connections. However, regardless of a user’s location, leveraging data encryption technology
helps individuals in protecting vital information from falling into the wrong hands. Data
encryption also increases the integrity of the information at different phases, including when data
is at rest, and when it is changing hands. Poor data quality increases the risk of business failure,
while high-quality data increases the potential for success, as businesses can learn more about
their customers and track trends, which are notable attributes of organizational success.
Data encryption is a vital security safeguard as it serves to halt unwarranted access to an
individual’s or corporate’s sensitive information without their consent. Studies show that a large
segment of persons whose data has been hacked is not immediately aware of the incident until
after a long time. According to Brandão (2018), with data encryption, the prevalence of such
incidents is significantly reduced, hence serving as an imperative security measure for both
indi...
