Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Encryption Responses

20/08/2020 Client: user_3wd25t Deadline: 24 Hours

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that's discusses the responses. 100% original work and not plagiarized. Must meet deadline.


RESPONSE 1:


The forum post asks us to discuss the role of encryption in ensuring confidentiality. Encryption can be defined as a way of scrambling data so that only the intended or authorized users can understand the data. Encryption requires the use of an encryption key to decipher the data. Encryption makes the data appear like random information or characters to anyone or anything on the outside. This scrambled up data can be referred to as ciphertext and starts out as plaintext then turns into cyphertext in transmission then back to plain text on the receiver end. Data can be encrypted at rest when it is stored, for example on a hard drive or USB stick. It can also be encrypted in transit while being transmitted. To decrypt the data there is a cryptographic key that is a string of characters used withing an encryption algorithm for altering the data to appear random. Encryption acts a lot like a physical lock and key where you need the correct key to lock and unlock the lock. In a way it is a considered a digital deadbolt. Some of the common encryption algorithms are Blowfish, AES, RC4-6, DES, and Twofish. One way of attempting to breach encryption is by a means called brute force attack. A brute force attack works by just making guesses for the correct decryption. These attacks can use millions of guesses in a short amount of time thanks to todays technology, which is why decryption has to be very intricate in todays world. I can’t really comment on this week’s lab yet due to the fact that I have not completed it yet. I will update after I complete the lab. Thanks for reading and take care.


Regards,


Chris


References


Written by Alison Grace Johansen for NortonLifeLock. (n.d.). What is encryption and how does it protect your data? Retrieved August 20, 2020, from https://us.norton.com/internetsecurity-privacy-what-is-encryption.html


RESPONSE 2:


In todays age encryptions are very important when it comes to ensuring confidentiality because it has the capability to ensure that only the people that actually have the encryption code are able to see the information instead of just allowing anyone to be able to use the information. This system prevents the unauthorized users from ever accessing such information. With information being so valuable today from that being within companies to just information we may have that could contain such things as our SSN or other private information that we do not need to be taking, information happens to be highly sought after because of the reasons by various cyber criminals that try to take this information for many reasons like opening up accounts in the persons name, wiping out bank accounts, taking information from companies that could be very valuable for the their company or using taking information to demand a request such as trading a certain amount of money for the information. A popular encryption that is considered to be one of the best encryption methods available is AES which is typically used by the government, it typically uses 192 keys and 256 bit for heavy duty encryption purposes .


When it came to this weeks lab it showed us the difference between bit locker and EFS and some of the different ways we would be able to use these while we encrypt files, which would be very helpful in the future considering the need for encryption.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Instant Homework Helper
Homework Guru
Assignment Hub
Top Rated Expert
Academic Master
Engineering Guru
Writer Writer Name Offer Chat
Instant Homework Helper

ONLINE

Instant Homework Helper

I am a highly-qualified writer, and I can assure you quality work on this topic. Try me once, I promise you I will not let you down. You may visit my profile and check all samples to ensure quality, accuracy, and grip over all topics.

$80 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I am a Ph.D. writer with more than 9 years of working experience in Writing. I have successfully completed more than 4500 projects for my clients with their full amount of satisfaction. I will provide you super quality work according to your given requirements and deadline with ZERO plagiarism. I can manage business and professional writing against very reasonable prices.

$60 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

I feel, I am the best option for you to fulfill this project with 100% perfection. I am working on this forum since 2014 and I have served more than 1200 clients with a full amount of satisfaction.

$55 Chat With Writer
Top Rated Expert

ONLINE

Top Rated Expert

i hope you are keeping safe. I will deliver quality essay with 0% plagiarism. I have 5 years of experience in writing essays and mainly in the field. I am also well conversant with all the referencing styles of writing such as APA, MLA, Havard, Chicago and IEEE. Kindly contact me so that we can discuss on the contents of the project. Thank you in advance.

$55 Chat With Writer
Academic Master

ONLINE

Academic Master

I have super grip on essays, case studies, reports and discussion posts. I am working on this forum from last 6 years with full amount of satisfaction of my clients.

$60 Chat With Writer
Engineering Guru

ONLINE

Engineering Guru

Hello, I have more than 10 years of writing experience. I can manage essays, summaries, reports and analysis works in very short period of time. I produce plagiarism free content for my clients, will send you FREE TURNITIN Reports as well. Thank you.

$80 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Honeywell cylinder stat wiring - What are aesthetic needs - Enthymeme in the media - Female chauvinist pigs ariel levy pdf - Java 2d api graphics pdf - Buscamos un viaje que ____ las comidas incluidas - Research Paper - Hr discussion - Your textbook recommends using visual aids to make statistics easier for listeners to comprehend. - Costco opti club st jerome - Administrative agency governs regulatory compliance of the manufacturer - Assignment #2 - 1/2 - And then you shoot your cousin full album - Mathworksheets4kids username and password - La película ____ / mala / la historia del cine - Activity based management pdf - Best practices for it infrastructure security policies - Maribyrnong council planning scheme - Dolch and fry sight words list - Discussion 4 - Diffusion experiment potassium permanganate - 61/155 macquarie street sydney - Where is the great wall of china on a map - Archer daniels midland and the friendly competitors case study - Red hill doctors bulk bill - Kilo mega giga tera peta - Computation - Salmon rocks cape conran - 5-1 - Concert band seating chart - 18/5 carousel close cromer - Unit 4 Case Study - Applying psychology to everyday life essay - Corporate leadership council australia - Where is the word christian found in the bible - Lambert martin automotive systems inc - Value proposition canvas strategyzer pdf - Collective human experiences examples - Paper - Damaged debit card st george - Example of addressing selection criteria - What does literature offer an individual - Importance of breakfast persuasive speech - Www luton gov uk parking - Business jet makers eye china - Marie curie fellows association - Juniper ssg 550 eol - Higher psychology past papers - Biorad sds page manual - How to unlock the gate in gilead - Cbus fund phone number - Napa valley college police academy - Medway council parking permits - Worcester boiler a21 fault - Targeting - Global furniture task chair 2000851 - 900 x 600 paving slabs jewsons - College prepares people for life freeman hrabowski summary - Capstone Research Companion - Midterm Japanese Politics - Shoo fly don t bother me - What reaction produces co2 and h2o - +91 9928097710<../*-/PowERful vashikaRan specialist Astrologer in IndORE , lucknOw - Social work case studies: concentration year - How to find the answer key to your homework - Family guy satire examples - Social media's small positive role in human relationships summary - Extension of an elastic band experiment - What you pawn i will redeem annotated bibliography - Services marketing concepts strategies & cases 4th edition pdf - Fm 10 67 2 - Lesson Plan Part 2: Implementation Section - How to double the volume of a square pyramid - Community assessment project nursing - Arden company reported the following costs and expenses - Week9 asst. - Introduction to advertising - The coase theorem relies on internalizing externalities through ________ - Where can you buy colgate wisp in canada - What is the step down method - Peter dowd driving instructor - Monitoring a reaction with thin layer chromatography lab report - P2#2 - Conch republic electronics part 1 answers - Similarities between scm crm and erp - ARR HIST 2 - Marketing Case Analysis - Brooklands vip pet products - Pan europa foods case study answers - How does aalsmeer flower auction work - Research development paper psy 335 - Which element of the word program window displays tab settings - Goaliath 2 player arcade basketball shootout dimensions - Emotional intelligence includes all of the following except - Convex slope in geography - Ph.D admission - Data Mining Discussion - Type the Agenda - Module 7