ENCRYPTION
By Group 3
Karilyn Lao, Richman Lo, & Robert Mastronardi
What is encryption?
A process that converts original information,
also called plain text into a difficult-tointerpret form called ciphertext.
Done by using an encryption algorithm, a
formula used to turn plain text into
ciphertext.
Two types: Asymmetric and Symmetric
Asymmetric Encryption
Symmetric Encryption
Which one is better?
Although, symmetric encryption is fast, it is
not as safe as asymmetric encryption because
someone could “steal” the key and decode
the messages. But because of its speed, it's
commonly used for e-commerce transactions.
Asymmetric encryption is more complex--and
more secure. Asymmetric encryption's added
safety comes at a price: More computation is
required, so the process takes longer.
Who’s using encryption?
If you use a computer and the internet,
you’re using encryption!
Enables all organizations regardless of their
size, to be both user-and-IT friendly.
Why use encryption?
Authentication
Protects
Privacy
Provides
personal data such as passwords.
for confidentiality of private information.
Integrity
Ensures
that a document or file has not been
altered.
Accountability
Prevents
denial or plagiarism.
How do you manage
encryption?
Make sure the encryption system has a
complete key management application.
This
will help manage and protect the data and
keys, and help you safely match encrypted
data with the right key.
Examples of Encryption
Web browser encryption
Email encryption
Hard drive encryption
Operating system protection
A few vendors and their
product coverage
Blackberry
System,
software, hardware, and service.
Global Technologies Group, Inc. (GTGI)
Software
Hewlett-Packard Company
System,
and hardware.
software, hardware, and service.
Intellect Security Ltd.
Software
How prevalent is it?
According to InformationWeek Research:
Of
500 sites surveyed, two-thirds report using encryption to protect
company data.
Of
500 companies surveyed, 43% use encryption on
both stored and transmitted data. More than three
out of five companies encrypt due to the threat of
outsiders intercepting sensitive data.
Continued…
Of
28% of sites surveyed, government regulation requires encryption of
stored and transmitted data.
For
38% of companies, the complexity of the technology is an
obstacle.
Some
businesses aren’t able to use the technology because of the lack of
skilled IT personnel and budget limitations.