Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Cryptography and information security by vk pachghare

03/11/2021 Client: muhammad11 Deadline: 2 Day

Cryptography

Running head: PROBLEMS WITH CRYPTOLOGY IN TECHNOLOGY 1

PROBLEMS WITH CRYPTOLOGY IN TECHNOLOGY 2

Problems with Cryptology in The Technology Industry

Student Name

University

Problems with Cryptology in The Technology Industry

Cryptology, also known as cryptography, refers to the process of protecting the integrity and confidentiality of information and data mainly through data encryption and access control techniques (Conklin et al., 2015). Encryption involves the transformation of plain text data into a ciphertext that can only be deciphered using an encryption key that is secured by people that own the data or have the right to access the data (Pachghare, 2015). Cryptology in the technology industry is widely used to safeguard information from loss or unauthorized access especially with the significant increase in the level of cyber-crime activities over the recent past. However, there is a myriad of problems associated with the use of cryptography in securing information in the technology industry mainly due to the slow access to information. This paper will discuss the problems associated with cryptography in the technology industry.

The technology industry is largely involved in handling user information and data and this makes the industry inherently prone to cyber-attacks that target data stored by the companies. Today, companies in the technology industry are required by various legislations to guarantee the privacy of user data and information collected by businesses and this has led to the increased awareness of data protection and security (White, Fisch, & Pooch, 2017). Moreover, the data owned by a company could be used by competing companies to sabotage operations in a company. This growing concern on the need to protect and safeguard the integrity of data among organizations in the technology industry has led to the increased adoption of encryption as a way of ensuring that information and data stored in a company is secure. In essence, data is encrypted using robust encryption algorithms cannot be deciphered by people who lack permission from the owners of the data (Yan, 2019). This access control mechanism reduces the risk of information and data breach in a company. However, despite the numerous advantages associated with cryptography in the technology industry, the practice is marred with a variety of challenges and this has undermined the use of cryptography among technology companies. The most prevalent issue with encryption is that it is extremely slow to encrypt and decrypt data (Yan, 2019). Today, organizations rely on data for the running of business operation and any delay in the access to information could result in a breakdown of business operation. However, there have been attempts to increase the speed of cryptography mainly through the use of faster algorithms of encryption and more powerful computers for encryption

Another major problem is the level of usability and technical know-how of cryptography, especially among average computer users. In essence, cryptography requires that computer users make use of encryption techniques to ensure the security of data. However, the process of encryption is not straight and this often leads to errors in encryption. Another major issue with encryption is the management of encryption keys used in cryptography (Conklin et al., 2015). Notably, encryption keys that are not securely stored are a security threat since illegal access to the key could compromise the security of information stored through encryption. In the technology industry, the management of encryption keys is even a bigger challenge issue owing to a large number of people that are directly involved in the management of information systems in an organization. As such it can be argued that the best security measure would be to build trust where people ensure that the confidentiality and integrity of user information and data in a computer system is upheld (Pachghare, 2015). Another major problem of cryptography is the laxity people to use the system in storage od data. Cryptography requires that data stored in a system is encrypted to ensure that the security of data is upheld, however, most computer users remain oblivious and chose not to encrypt data mainly due to time constraints and lack of technical know-how. However, in the recent past, there have been better and easier strategies of cryptography such as the end to end encryption which is easier to use among employees in an organization (Conklin et al., 2015). In addition, today computer users are more conscious in their online activities and this has reduced the level of byre rime in the general public. Overall, it can be argued that despite the numerous challenges associated with cryptology in the technology industry, there are numerous advantages that cryptology brings to companies in the industry.

In conclusion, it has emerged that cryptology as an effective strategy of safeguarding and protecting the integrity and confidentiality of data and information in the technology industry. However, the practice is associated with various challenges such as the slow process of encryption, the storage of the encryption key, and the lack of technical know-how of encryption strategies. Nonetheless, cryptography provides exciting opportunities for businesses in the technology industry since it guarantees the security and confidentiality of user data and information stored in information systems.

References

Conklin, W. A., White, G., Cothren, C., Davis, R., & Williams, D. (2015). Principles of computer security. McGraw-Hill Education Group.

Pachghare, V. K. (2015). Cryptography and information security. PHI Learning Pvt. Ltd..

White, G. B., Fisch, E. A., & Pooch, U. W. (2017). Computer system and network security. CRC press.

Yan, S. Y. (2019). Cyberspace Security and Cryptography. In Cybercryptography: Applicable Cryptography for Cyberspace Security (pp. 1-20). Springer, Cham.

Running

head:

PROBLEMS WITH CRYPTOLOGY

IN TE

C

HNOLOGY

1

Problems with Cryptology

i

n The Technology Industry

Student Name

University

Running head: PROBLEMS WITH CRYPTOLOGY IN TECHNOLOGY 1

Problems with Cryptology in The Technology Industry

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Professor
Engineering Guru
Essay & Assignment Help
Innovative Writer
Peter O.
Buy Coursework Help
Writer Writer Name Offer Chat
Finance Professor

ONLINE

Finance Professor

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$32 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$44 Chat With Writer
Essay & Assignment Help

ONLINE

Essay & Assignment Help

I have read your project description carefully and you will get plagiarism free writing according to your requirements. Thank You

$16 Chat With Writer
Innovative Writer

ONLINE

Innovative Writer

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$45 Chat With Writer
Peter O.

ONLINE

Peter O.

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$37 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$37 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Information systems infrastructure evolution and trends articles - Puffing billy route map - Dan Lowe argues that we should take a certain attitude to what he calls "biological explanations of social inequalities". - Trigonometry multiple choice questions and answers - What factor differentiated chattel slavery from indentured servitude - How many categories are located in the mediastinum subheading - What do romeo and benvolio decide to do - Chapter 8 study guide answers accounting - Some words with a mummy essay - Mth 221 discrete math for information technology - MBA work 11 - Mi familia y yo hemos llevado una vida sana. (me alegro de que) - NURS521REPLYPROMPT2 - Usa today innovation and evolution in a troubled industry - Global marketing pearson 9th edition pdf - Marketing management mcqs with answers - Week 7B - Ohm's law lab report - Actron air split system manual - What are the 3 most essential questions to ask in threat modeling? - Vcat civil claims form - Strategic and technical security measures - Perception errors in organisational behaviour - King of bling birmingham - Pearson brothers recently reported an ebitda of $7.5 million - Unit 18 global business environment assignment - The Benjamini-Hochberg procedure (BH procedure) - Mason grey strange auctions - In praise of the f word questions and answers - Box of biscuits tongue twister - How to calculate cmrr - American greetings case study solution - What criteria concerning moral judgments should we agree with - Prepare a 1-2-page double spaced journal entry in which you describe Skinner’s Radical Behaviorism. - Lactophenol cotton blue himedia - Organization - Discussion Board 5.2: Nothing About Us Without Us - East oldham methodist church - How to leave hialeah pdf - Spectrum sunglass company simulation - Run lola run jump cuts - Volunteer task list template - Hay day champion league trashing tasks - English discussion - 8 mile wasting my time - Skinpen by bellus medical for sale - Sephora direct investing in social media video and mobile - Ebay clothing listing template - Purex triton minimax 400 manual - What are krakauer's credentials for writing into the wild - Resistance and resistivity mastering physics - DURBAN Gynecological FEMALE +27835179056 SAFE ABORTION PILLS IN Bergville Elandslaagte Estcourt Ladysmith Winterton Dundee - Curtin letter of enrolment - Data Analysis and Visualisation - Ombersley endowed first school - Environmental determinism and possibilism - Macbeth act 2 audio - Family life merit badge workbook - The proper quantity of safety stock is typically determined by - Massage questionnaire for clients - WEEK4 RESPONSE 6052 - How to use a potato for electricity - Heart failure - The flying machine theme - Cds gross pollutant trap - Question 8 - Technical description for a non specialized audience - All souls chapter summary - Martinez company's relevant range of production - Business - Public health job cover letter - Mla style scavenger hunt answers - Sources of fruit bearing trees in the philippines - Water cycle plastic bag - Discussion social behavior - Three bars cattle and guest ranch - Crime fighter role of policing - The autobiography of yukichi fukuzawa pdf - Issue the appropriate command to discover the following information - Paper - Elearning kbs - Powerpoint on Group Cohesiveness - Dot and cross diagram for hf - Organisational structure of kfc india - Norton rose fulbright dx - Chuck close big self portrait 1967 68 - What should gore do to build effective global teams - ORGANIZATIONAL CONFLICT PAPER - Sociology - Health and human development revision notes - Sharp printing ag case study - Acc 291 final exam - Position paper - Chimamanda adichie the danger of a single story analysis - University of worcester sole - Ride safe handbook wa - Company of heroes failed to create dump file error 183 - David wecker heating and air conditioning - Budgeted manufacturing overhead rate - Quadruple constraints of project management