They insisted that “availability is more important than confidentiality”. However, for some reasons other than the cost of deployment and managing an encryption solution, some organizations have shunned or still undecided about adopting encryption solutions. The study conducted by showed the increased usage of full disk, virtual volume, native disk, and flash drive encryptions over two years. Disk manufacturers are embedding full encryption tools into their products, making encryption more available for use. This has led to the growing availability of full disk encryption tools. Data encryption may not be an explicit solution to information security problems, as organizations remain increasingly vulnerable to data breach incidents, but it is still the most efficient fix when deployed adequately. Data security involves the consideration of potential confidentiality, integrity, and availability threats to data services, using functions such as identification, authentication, authorization and audit. The necessity to keep such information within the required confines describes a component purpose of Information Security, which involves the totality of activities to ensure the protection of information assets that use, store, or transmit information from risk through the application of policies, education, training, awareness, and technology. Governments and agencies keep sensitive information that may affect the stability of their jurisdictions, politically or economically, if divulged. Their intellectual properties and trade secrets are kept away from potential exploits, thus, considered very private. A good amount of such information is critical to their sustained existence and growth. Businesses and organizations possess larger amounts of information than individuals. Such valued information includes their financial details, medical records, locations, as well as professional and network information. Significant amounts of such information are valued and consequently preferred to be known to them alone. Individuals keeps more amount of information than organizations kept in the yesteryears. The direct encryption of data or indirect encryption of storage devices, more often than not, prevents access to such information contained therein.ĭata is becoming largely existent in today’s world than they were anticipated three decades ago. Unfortunately, it is also popular as cyber-criminals’ escape route from the grasp of digital forensic investigatiors. The most emphasized reason is the necessity to ensure confidentiality of privileged information. Owing to a number of reasons, the deployment of encryption solutions are beginning to be ubiquitous at both organizational and individual levels. As we always use the MS Office, there are many ways to hide secret messages by using PowerPoint as normal file. Among others techniques of message hiding, steganography is one them but more suspicious as no one cannot see the secret message. The growth of both IT technology and the Internet Communication has involved the development of lot of encrypted information. Something the individual is (static biometrics, e.g. Something the individual does (token e.g: smartcard, electronic keycard, physical key). password, PIN, answers to prearranged questions). There are usually four means of authenticating user identity based on: something the individual know (e.g. The peer entity authentication provides for the corroboration of the identity of a peer entity in an association for use of a connection at the establishment or at times during the data transfer phase, which attempts to provide confidence that an entity is not performing either a masquerade or an unauthorized replay of a previous connection. The data origin authentication provides for the corroboration of the source of a data unit without the protection against the duplication or modification of data units, and this type of service supports applications like email where there are no prior interactions between the communicating entities. The authentication service must assure that the connection is not interfered by a third party masquerading as one of the two legitimate parties, which usually concerns two approaches data origin authentication. RFC 2828 defines user authentication as “the process of verifying an identity claimed by or for a system entity”. The passwords is now also commonly used for user authentication issue, which is very important to the internet security. The password has been used to encrypt the information or message for a long time in the history and it leads to discipline: cryptography, Furthermore, with the rapid development of computer science.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |