Encryption

Anonymous
timer Asked: Oct 20th, 2018
account_balance_wallet $9.99

Question Description

Hello,

The topic is about encryption.

  • what is the current cybersecurity-related situation involving the topic you chose?What do you predict will happen in the future regarding your topic?
  • With regards to the topic you chose, how can it be used for good and how can it be used for criminal purposes?
  • What are the social, political and legal aspects of the topic you selected?

For requirements see below document

Please write about encryption i have posted one professor who gave me wrong answer. I am posting it again please consider this and work on it. we need PPT of 10 slides. No reference required in PPT.

thanks,

Tutor Answer

Robyn1994
School: Duke University

Attached.

Running Head: ENCRYPTION OF DATA
Encryption
Student Name:
Professor Name:
Course Name &Number:
University:
Paper Due Date:

1

ENCRYPTION OF DATA

2

Abstract
Data encryption refers to the process of converting plaintext or electronic data into
ciphertext form; a form of data that is only accessible by the authorized personnel through the
use of a description key and cannot be understood by any other parties (Waters, 2011).
Encryption has the sole objective of ensuring the confidentiality of all forms of data stored on a
computer or transmitted through computer networks such as the Internet is maintained.
Encryption of data or information is integral in modern society where cyber security has become
a major issue of concern. Encryption is important as it enables individuals and organizations to
protect confidential information. Encryption has found a lot of uses among various parties
ranging from individuals aspiring to protect personal information to governments seeking to
secure classified information. Businesses also use encryption to secure business secrets and other
trade secrets. Therefore, encryption is an important component to various parties seeking to
secure confidential information and prevent unauthorized access that could compromise the
integrity of the information.

ENCRYPTION OF DATA

3

Introduction
Encryption is a technique used in computing to convert data such as plaintext from its
readable form into an encoded form that can only be decoded by the party with a decryption key.
Encryption is a very important technique utilized to guarantee data security especially when
transmitting data from one end to another (Singh & Maini, 2011). Encryption is primarily
utilized on the internet to protect sensitive information such as passwords, payment information,
as well as any other information that is regarded sensitive. Encryption is also used by
organizations as well as individuals to protect information that is stored on devices such as
servers, mobile phones, computers, and tablets. Encryption ensures that the information does not
fall on the wrong hands that could risk the exposure or misuse of the sensitive information.
Due to its ability to protect sensitive and confidential information, encryption has become
an integral part of cyber security. According to a report by McAfee, the annual damage
associated with cyber security is approximated to cost the global economy a whopping $445
billion. Additionally, in the year 2016, a research by Juniper research approximated the cost of
cyber-crime to rise to 2.1 trillion by the year 2019. These statistics are alarming and reveal the
threat posed by cyber security. The occurrence of cyber security crimes threatens the security of
data and information on the internet and personal devices such as computers and mobile phones.
Thus, organizations utilize encryption to protect their sensitive information against unauthorized
access.
Cyber security has become a global concern owing to the vast adoption of the computer
technology and subsequent over-reliance on these systems. In response to this malice,

ENCRYPTION OF DATA

4

stakeholders have the role of combating the loopholes by starting a relentless war on the cyber
security. This entails restriction of the unauthorized information access in organizations and
global industry. Cyber threats are diverse in nature and often aim at private enterprises that put at
risk the integrity of the digital world. For example, in May 2017, WannaCry ransom ware: a
computer virus that holds people’s personal data until a ransom is released affected millions of
computers across the globe. The cost of these attacks in USA, United Kingdom, and other
countries was estimated to be $1 billion (Glisson & Choo, 2017). These attacks indicate that
cyber threats are on the rise and more importantly are not prone to a single country or state but
on the contrary affect the world at a large scale more so the global market. According to the
Lloyd of London Report, an attack on Amazon would cost an estimated amount of $53 million
that is equivalent to the estimated losses incurred as a result of the Hurricane Sandy that hit
America in 2012 (Glisson & Choo, 2017). Thus, the cost of cyber threats is estimated to cost
same or more than some of the most disastrous epidemics in human history. As a result,
installation of effective security measures such as encryption is in order to protect organizations
against data loss and unauthorized access of organizations.
Additionally, there are several cyber security crimes that take place over the internet
focusing on the computer networks as well as mobile devices. Examples of cyber security threats
faced by organizations in today’s world include: computer malware, viruses as well as denial-ofservice attacks. In a scenario whereby the individual is a prime target of cyber-crime, the
computer is regarded as a tool instead of the target. These sorts of crimes usually require little
technical know-how. The factors that are usually exploited are the human errors. The harm
usually incurred in such cases is usually psychological as well as intangible making the filing of
a legal complaint very challenging (Gupta, Agrawal & Yamaguchi, 2016). These types of crimes

ENCRYPTION OF DATA

5

in the offline world have existed for several centuries. Crimes such as sc...

flag Report DMCA
Review

Anonymous
Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors