Encryption

Published on May 2016 | Categories: Types, Presentations | Downloads: 98 | Comments: 0 | Views: 446
of 14
Download PDF   Embed   Report

Comments

Content

ENCRYPTION
By Group 3
Karilyn Lao, Richman Lo, & Robert Mastronardi

What is encryption?


A process that converts original information,
also called plain text into a difficult-tointerpret form called ciphertext.



Done by using an encryption algorithm, a
formula used to turn plain text into
ciphertext.
Two types: Asymmetric and Symmetric



Asymmetric Encryption

Symmetric Encryption

Which one is better?


Although, symmetric encryption is fast, it is
not as safe as asymmetric encryption because
someone could “steal” the key and decode
the messages. But because of its speed, it's
commonly used for e-commerce transactions.



Asymmetric encryption is more complex--and
more secure. Asymmetric encryption's added
safety comes at a price: More computation is
required, so the process takes longer.

Who’s using encryption?


If you use a computer and the internet,
you’re using encryption!



Enables all organizations regardless of their
size, to be both user-and-IT friendly.

Why use encryption?


Authentication
 Protects



Privacy
 Provides



personal data such as passwords.

for confidentiality of private information.

Integrity
 Ensures

that a document or file has not been

altered.


Accountability
 Prevents

denial or plagiarism.

How do you manage
encryption?


Make sure the encryption system has a
complete key management application.
 This

will help manage and protect the data and
keys, and help you safely match encrypted
data with the right key.

Examples of Encryption


Web browser encryption



Email encryption



Hard drive encryption



Operating system protection

A few vendors and their
product coverage


Blackberry
 System,



software, hardware, and service.

Global Technologies Group, Inc. (GTGI)
 Software



Hewlett-Packard Company
 System,



and hardware.

software, hardware, and service.

Intellect Security Ltd.
 Software

How prevalent is it?


According to InformationWeek Research:
 Of

500 sites surveyed, two-thirds report using encryption to protect
company data.

 Of

500 companies surveyed, 43% use encryption on
both stored and transmitted data. More than three
out of five companies encrypt due to the threat of
outsiders intercepting sensitive data.

Continued…

 Of

28% of sites surveyed, government regulation requires encryption of
stored and transmitted data.

 For

38% of companies, the complexity of the technology is an
obstacle.

 Some

businesses aren’t able to use the technology because of the lack of
skilled IT personnel and budget limitations.

Want more???


More on what encryption is…













http://cplus.about.com/od/introductiontoprogramming/p/encryptio
n.htm
http://www.pcworld.com/article/id,15230/article.html
http://www.encyclopedia.com/doc/1G1-144388099.html
http://www.informationweek.com/news/showArticle.jhtml?
articleID=6507540
http://security.homeoffice.gov.uk/ripa/encryption/types-ofencryption/
http://www.itworld.com/nl/unix_sec/01242002/
http://www.pcmag.com/encyclopedia_term/0,2542,t=encryption+
algorithm&i=42595,00.asp

More on vendors and more detailed products…


http://securitypark.bitpipe.com/olist/Data-Encryption.html

Questions???

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close