Discuss about the symmetric algorithms

Assignment Help Management Information Sys
Reference no: EM131601189

Question: "Cryptography" Please respond to the following:

Considering that, due to its extremely sensitive nature, shared data that organizations transmit through collaboration must be kept confidential at all costs, formulate a possible solution that utilizes symmetric or asymmetric cryptography, and describe the advantages and disadvantages of the selected solution. If you had to select one (1) of the two (2) encryption options over the other, justify the one that you would choose, and explain your reasoning.

From the e-Activity and your own research, give your opinion of the two (2) most important ways that you believe encryption could assist in addressing some of the current challenges facing organizations today, and explain why these solutions are so important. Justify your answer

A response is needed for the following below: Two paragraphs

In the understanding of encryption data within the same organization, say for example the "Navy" military facility, and I use this example because it has been a greater part of my life, but in utilizing encryption on this scale you would want to choose between them both for inside the network and frame work of the base firewall and data infrastructure, you need for information to be ready in the means of communicating swiftly through the chain of command so that orders and instructions can be passed down without interruptions. But when you have various encryption algorithms that through a wrench in this process through the process of keys not being correct on the other end to handle unencrypted or deciphers the message sent then this is where the lines of communication can get rather murky and miscommunication or the failure to communicate takes over.

By using symmetric algorithms, which is known as the secret key, this method can be used for encryption and decryption of vital data transference be it text messaging on your cell or email messages to coworkers for this secret key is accessible to everyone in the group and it is maintained within the infrastructure of the organization or the business but when you are dealing with outside forces and information has to be sent outside of the processes of your business then it is best to have an asymmetric algorithm also known as a public key which really break down into a public key and a private key which if you have transmitters who are sending data back and forth to one another whether on the other side of the world or in different states inside the same country, they are made in such a way that it is impossible for a hacker to tell which key is which.

Given the rate at which the general public is being hammered by hackers and either high or low-level cyber-thieves that work hard to still your identity and make life really difficult for those of us that work hard for a living, it is in my opinion that we should make a practice in learning the methodology of know how to encrypt our files with the highest protection against such criminal activity. If only to protect ourselves and our identity from someone who is only seeking to steal that which you have worked hard to build. I feel that both symmetric and asymmetric are both needed for it is not always a necessary thing to super encrypts a casual text message to a friend or family member but the vital information of the inner workings of a military structure or a huge global business network is very important.

Reference no: EM131601189

Questions Cloud

What amount should be debited to bad debt expense : A company uses the percentage of credit sales method to account for bad debt expense. What amount should be debited to Bad Debt Expense
What is a price taker : What is a price taker? Discuss the assumptions that are made in order to obtain the perfectly competitive model.
Define the classical and neoclassical schools of criminology : which a particular type of crime property, violent, or drug crime can be explained using the Classical and Neoclassical schools of criminology
How would you define cultural competency : Why is cultural competency important for substance abuse counselors? How would you acquire this skill?
Discuss about the symmetric algorithms : Considering that, due to its extremely sensitive nature, shared data that organizations transmit through collaboration must be kept confidential at all costs.
Identify each organizations purpose duties and methods : Identify each organization's purpose, duties, and methods of monitoring quality. Describe their impact on quality of care in health care organizations.
Prepare the journal entry : Tim Latimer Corporation had the following transactions. Sold land (cost $13,056) for $10,880. For each transaction above, prepare the journal entry
Production possibility frontier for the production : Draw a Production Possibility Frontier for the production of hamburgers and milkshakes at a hamburger restaurant (which faces increasing marginal opportunity.
Explain several of pressures that influence their strategies : Describe several of the pressures that influenced their strategies. Distinguish between social responsibility, integrity and simple business ethics.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd