{ 4 }Cryptography
Information security uses cryptography to transform usable information into a form that renders it unusable by anyone other than an authorized user; this process is called encryption. Information that has been encrypted (rendered unusable) can be transformed back into its original usable form by an authorized user, who possesses the cryptographic key, through the process of decryption. Cryptography is used in information security to protect information from unauthorized or accidental disclosure while the information is in transit (either electronically or physically) and while information is in storage.
Cryptography provides information security with other useful applications as well including improved authentication methods, message digests, digital signatures, non-repudiation, and encrypted network communications. Older less secure application such as telnet and ftp are slowly being replaced with more secure applications such as ssh that use encrypted network communications. Wireless communications can be encrypted using protocols such as WPA/WPA2 or the older (and less secure) WEP. Wired communications (such as ITU-T G.hn) are secured using AES for encryption and X.1035 for authentication and key exchange. Software applications such as GnuPG or PGP can be used to encrypt data files and Email.
Cryptography can introduce security problems when it is not implemented correctly. Cryptographic solutions need to be implemented using industry accepted solutions that have undergone rigorous peer review by independent experts in cryptography. The length and strength of the encryption key is also an important consideration. A key that is weak or too short will produce weak encryption. The keys used for encryption and decryption must be protected with the same degree of rigor as any other confidential information. They must be protected from unauthorized disclosure and destruction and they must be available when needed. PKI solutions address many of the problems that surround key management.
Hanyaqusendiri
-
Hurm,,boing glewr r arie niew...x tau r na wat pe hehehe..
-
Second Generation (1956-1963) Transistors Transistors replaced vacuum tubes and ushered in the second generation of computers. The trans...
-
Security Measures If you do not at least have a personal firewall and anti-virus protection then you should not connect your computer to the...
-
Education Teacher use computers to research for teaching materials, participate in online forum and online conferences. Students use compu...
-
{ 4 }Cryptography Information security uses cryptography to transform usable information into a form that renders it unusable by anyon...
-
{ 2 }Firewall To answer that question, some networking background information must first be outlined. I will try not to get too technica...
-
Fifth Generation (Present and Beyond) Artificial Intelligence Fifth generation computing devices, based on artificial intelligence , are...
-
{ 3 }Backup When backing up your data, you will need some offline storage device such as one or more of: Tape Storage Device. Zip...
-
Fourth Generation (1971-Present) Microprocessors The microprocessor brought the fourth generation of computers, as thousands of integr...
No comments:
Post a Comment