Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Encryption Responses

20/08/2020 Client: user_3wd25t Deadline: 24 Hours

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that's discusses the responses. 100% original work and not plagiarized. Must meet deadline.


RESPONSE 1:


The forum post asks us to discuss the role of encryption in ensuring confidentiality. Encryption can be defined as a way of scrambling data so that only the intended or authorized users can understand the data. Encryption requires the use of an encryption key to decipher the data. Encryption makes the data appear like random information or characters to anyone or anything on the outside. This scrambled up data can be referred to as ciphertext and starts out as plaintext then turns into cyphertext in transmission then back to plain text on the receiver end. Data can be encrypted at rest when it is stored, for example on a hard drive or USB stick. It can also be encrypted in transit while being transmitted. To decrypt the data there is a cryptographic key that is a string of characters used withing an encryption algorithm for altering the data to appear random. Encryption acts a lot like a physical lock and key where you need the correct key to lock and unlock the lock. In a way it is a considered a digital deadbolt. Some of the common encryption algorithms are Blowfish, AES, RC4-6, DES, and Twofish. One way of attempting to breach encryption is by a means called brute force attack. A brute force attack works by just making guesses for the correct decryption. These attacks can use millions of guesses in a short amount of time thanks to todays technology, which is why decryption has to be very intricate in todays world. I can’t really comment on this week’s lab yet due to the fact that I have not completed it yet. I will update after I complete the lab. Thanks for reading and take care.


Regards,


Chris


References


Written by Alison Grace Johansen for NortonLifeLock. (n.d.). What is encryption and how does it protect your data? Retrieved August 20, 2020, from https://us.norton.com/internetsecurity-privacy-what-is-encryption.html


RESPONSE 2:


In todays age encryptions are very important when it comes to ensuring confidentiality because it has the capability to ensure that only the people that actually have the encryption code are able to see the information instead of just allowing anyone to be able to use the information. This system prevents the unauthorized users from ever accessing such information. With information being so valuable today from that being within companies to just information we may have that could contain such things as our SSN or other private information that we do not need to be taking, information happens to be highly sought after because of the reasons by various cyber criminals that try to take this information for many reasons like opening up accounts in the persons name, wiping out bank accounts, taking information from companies that could be very valuable for the their company or using taking information to demand a request such as trading a certain amount of money for the information. A popular encryption that is considered to be one of the best encryption methods available is AES which is typically used by the government, it typically uses 192 keys and 256 bit for heavy duty encryption purposes .


When it came to this weeks lab it showed us the difference between bit locker and EFS and some of the different ways we would be able to use these while we encrypt files, which would be very helpful in the future considering the need for encryption.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Instant Homework Helper
Homework Guru
Assignment Hub
Top Rated Expert
Academic Master
Engineering Guru
Writer Writer Name Offer Chat
Instant Homework Helper

ONLINE

Instant Homework Helper

I am a highly-qualified writer, and I can assure you quality work on this topic. Try me once, I promise you I will not let you down. You may visit my profile and check all samples to ensure quality, accuracy, and grip over all topics.

$80 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I am a Ph.D. writer with more than 9 years of working experience in Writing. I have successfully completed more than 4500 projects for my clients with their full amount of satisfaction. I will provide you super quality work according to your given requirements and deadline with ZERO plagiarism. I can manage business and professional writing against very reasonable prices.

$60 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

I feel, I am the best option for you to fulfill this project with 100% perfection. I am working on this forum since 2014 and I have served more than 1200 clients with a full amount of satisfaction.

$55 Chat With Writer
Top Rated Expert

ONLINE

Top Rated Expert

i hope you are keeping safe. I will deliver quality essay with 0% plagiarism. I have 5 years of experience in writing essays and mainly in the field. I am also well conversant with all the referencing styles of writing such as APA, MLA, Havard, Chicago and IEEE. Kindly contact me so that we can discuss on the contents of the project. Thank you in advance.

$55 Chat With Writer
Academic Master

ONLINE

Academic Master

I have super grip on essays, case studies, reports and discussion posts. I am working on this forum from last 6 years with full amount of satisfaction of my clients.

$60 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

Hello, I have more than 10 years of writing experience. I can manage essays, summaries, reports and analysis works in very short period of time. I produce plagiarism free content for my clients, will send you FREE TURNITIN Reports as well. Thank you.

$80 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

What does juliet plan to do with the cords - Discussion Question. Must be 5 paragraphs - Springer book template word - I will upload - Examples of disrespect in the classroom - Nh4cl + h2o enthalpy - Www police nsw gov au criminal history check - An olympic high jumper leaps over - Free tr 069 server - How to write an educational platform - Ccna course in gujranwala - Module 2 Assignment 2 Instructions: Summary of NBC Parole Hearing and Parole Recommendation - Greys gfs 40 reel - Online community - Army memorandum format ar 25 50 - What is the single most characteristic feature of sedimentary rocks - What are the seven domains of a typical it infrastructure - Launching a new venture - Beck v darling downs institute of advanced education case summary - Arimidex dosage during cycle - Crown employees award 2021 - Секретная служба санта клауса на английском - Certificate 4 in Training and assesment - Strategic staffing handbook example - Essay Guru ONLY - Physics lab series and parallel circuits - Pillow method is designed to - MC WK 6 Journal Article - Advantages of second class levers - Computech corporation is expanding rapidly - The Application of Data to Problem-Solving - Juvenile court proceedings were originally conceptualized as civil proceedings - Critical response essay. - Values and lifestyles system - My personal culture essays - Best eye drops for welders flash - Http eslus com lessons grammar pos pos htm - Virtual fetal pig dissection lab answers - Wayland custom woodworking payroll project answers - What is health economics ppt - Sparknotes the book thief part 6 - The beach carrier case study entrepreneurship - Certificate iv in fire protection - Week 4 assignment - Michael rosen loves cho cho cho cake - Salvador dali frida kahlo relationship - Three defective electric toothbrushes were accidentally shipped to a drugstore - Shelton and lane horsham - FPGA - LED Patterns - C-TPAT - Six root causes of managerial incompetence and derailment - Commedia dell arte history timeline - Parkdale v puxu summary - Writing about movies gocsik pdf - Chubb fire hose reel - How to make an array in mips - 200 WORD RESPONSE - Journal #1 - Question to be answered - Norton studyspace give me liberty 4th edition - Quartet whiteboard cleaner sds - Module 02 Lab 01 - Coffee Problem - How to make sieve analysis graph - Topographic map practice worksheet - Video - Keats king's college london - You are a Malaysian trainer who is a highly sought out expert in the area of cross-cultural negotiation. The Communications Director of a large company has asked you to write an article on ‘Guidelines for cross-cultural negotiations in India’ for their business magazine. - Microsoft threat modeling tool 2016 - Excel module 2 sam project a - Triple c camp charlottesville review - Backup and recovery plan template - Nokia and microsoft merger ppt - Cosca module 2 essay - Bioecological model template - Family health assessment part 2 - Lta pedestrian overhead bridge - Audience analysis memo sample - PPT - 2 3 assignment write a class it 145 - Creating a company culture for security design document - PTSD Active duty and Veterans - Discussion - Diagnostic Skill Application II - Identity authority and learning to write in new workplaces - Pwc internship recruitment process - Old dulux suede colours - 125 degrees celcius to farenheit - Coast Guard - Steve hardy costco - Word chapter 1 project 1a simulation training - Agl com au nswseniors - A2 b2 c2 obtuse triangle - First cirque du soleil show 1984 - Margaret atwood scarlet ibis - What is the purpose of a windshield survey - Our iceberg is melting 8 steps - MHA/542 - 1910 sears catalog buying credit folly - Larkin hospital nursing school - Cry the beloved country chapter 7