Reference no: EM131601189
Question: "Cryptography" Please respond to the following:
Considering that, due to its extremely sensitive nature, shared data that organizations transmit through collaboration must be kept confidential at all costs, formulate a possible solution that utilizes symmetric or asymmetric cryptography, and describe the advantages and disadvantages of the selected solution. If you had to select one (1) of the two (2) encryption options over the other, justify the one that you would choose, and explain your reasoning.
From the e-Activity and your own research, give your opinion of the two (2) most important ways that you believe encryption could assist in addressing some of the current challenges facing organizations today, and explain why these solutions are so important. Justify your answer
A response is needed for the following below: Two paragraphs
In the understanding of encryption data within the same organization, say for example the "Navy" military facility, and I use this example because it has been a greater part of my life, but in utilizing encryption on this scale you would want to choose between them both for inside the network and frame work of the base firewall and data infrastructure, you need for information to be ready in the means of communicating swiftly through the chain of command so that orders and instructions can be passed down without interruptions. But when you have various encryption algorithms that through a wrench in this process through the process of keys not being correct on the other end to handle unencrypted or deciphers the message sent then this is where the lines of communication can get rather murky and miscommunication or the failure to communicate takes over.
By using symmetric algorithms, which is known as the secret key, this method can be used for encryption and decryption of vital data transference be it text messaging on your cell or email messages to coworkers for this secret key is accessible to everyone in the group and it is maintained within the infrastructure of the organization or the business but when you are dealing with outside forces and information has to be sent outside of the processes of your business then it is best to have an asymmetric algorithm also known as a public key which really break down into a public key and a private key which if you have transmitters who are sending data back and forth to one another whether on the other side of the world or in different states inside the same country, they are made in such a way that it is impossible for a hacker to tell which key is which.
Given the rate at which the general public is being hammered by hackers and either high or low-level cyber-thieves that work hard to still your identity and make life really difficult for those of us that work hard for a living, it is in my opinion that we should make a practice in learning the methodology of know how to encrypt our files with the highest protection against such criminal activity. If only to protect ourselves and our identity from someone who is only seeking to steal that which you have worked hard to build. I feel that both symmetric and asymmetric are both needed for it is not always a necessary thing to super encrypts a casual text message to a friend or family member but the vital information of the inner workings of a military structure or a huge global business network is very important.
What amount should be debited to bad debt expense
: A company uses the percentage of credit sales method to account for bad debt expense. What amount should be debited to Bad Debt Expense
|
What is a price taker
: What is a price taker? Discuss the assumptions that are made in order to obtain the perfectly competitive model.
|
Define the classical and neoclassical schools of criminology
: which a particular type of crime property, violent, or drug crime can be explained using the Classical and Neoclassical schools of criminology
|
How would you define cultural competency
: Why is cultural competency important for substance abuse counselors? How would you acquire this skill?
|
Discuss about the symmetric algorithms
: Considering that, due to its extremely sensitive nature, shared data that organizations transmit through collaboration must be kept confidential at all costs.
|
Identify each organizations purpose duties and methods
: Identify each organization's purpose, duties, and methods of monitoring quality. Describe their impact on quality of care in health care organizations.
|
Prepare the journal entry
: Tim Latimer Corporation had the following transactions. Sold land (cost $13,056) for $10,880. For each transaction above, prepare the journal entry
|
Production possibility frontier for the production
: Draw a Production Possibility Frontier for the production of hamburgers and milkshakes at a hamburger restaurant (which faces increasing marginal opportunity.
|
Explain several of pressures that influence their strategies
: Describe several of the pressures that influenced their strategies. Distinguish between social responsibility, integrity and simple business ethics.
|