Access Millions of academic & study documents

Data encryption

Content type
User Generated
Showing Page:
1/4
DATA ENCRYPTION
Data encryption is a process of translating data into another code as a security measure to enable
only people with a secret key which mostly comes as a password to access it. Most organizations
have adopted this strategy as a way of data protection from unauthorized access. There are two

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
types of data encryption; asymmetric encryption which uses two distinct keys that are mostly
related. The public key is mainly used for the encryption process and the private one which is
used for decryption purpose. The second type is symmetric encryption which the “normal” type.
This encryption process utilizes only one secret key to perform both the encryption and
decryption duties.
Following the rapid increase in the level of cyber-crimes in organizations, I think it is a good
idea to undertake data encryption. First, organizational data is mostly affected by various
external and internal factors such as confidentiality since it may contain sensitive information. In
this connection, encryption plays an essential role in allowing only authorized persons to access
the data. Lack of confidentiality in organizational data is associated with multiple disadvantages
that affect the objective of the organization (Gai, Qiu, & Zhao, 2017). For instance, it may lead
to the loss of a good reputation especially when the customers and other relevant stakeholders
learn that there is no potential data protection method.
Secondly, the process of data encryption allows the installation of key specific security features
that plays an essential role in protecting the data not only from external forces but also internal
factors that may ruin the data in one way or the other. For instance, the process facilitates it
drives the installation of initiatives such as authentication and integrity. Authentication enables
the data operator to verify the origin of various messages that may affect the data while the
integrity initiative provides valid proof that the message content has not been altered since the
message was sent. Besides, the process allows non-repudiation installation to ensure that the
message sender may not erase the proof that he or she had sent the message. In this regard, data
encryption ensures that the data is protected even in its minor specifics.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now
Unformatted Attachment Preview
DATA ENCRYPTION Data encryption is a process of translating data into another code as a security measure to enable only people with a secret key which mostly comes as a password to access it. Most organizations have adopted this strategy as a way of data protection from unauthorized access. There are two types of data encryption; asymmetric encryption which uses two distinct keys that are mostly related. The public key is mainly used for the encryption process and the private one which is used for decryption purpose. The second type is symmetric encryption which the “normal” type. This encryption process utilizes only one secret key to perform both the encryption and decryption duties. Following the rapid increase in the level of cyber-crimes in organizations, I think it is a good idea to undertake data encryption. First, organizational data is mostly affected by various external and internal factors such as confidentiality since it may contain sensitive information. In this connection, encryption plays an essential role in allowing only authorized persons to access the data. Lack of confidentiality in organizational data is associated with multiple disadvantages that affect ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4