Sign In
Not register? Register Now!
Pages:
1 page/β‰ˆ275 words
Sources:
Check Instructions
Style:
APA
Subject:
IT & Computer Science
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 6.48
Topic:

Encryption Features Analysis

Coursework Instructions:

Both Microsoft Windows and Linux utilize several different encryption features. What type(s) of encryption features are best for your organization? Is it necessary to encrypt data at-rest, in-transit, or only under certain circumstances? Explain.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
Refer to "ITT-121 User and Group Management Scoring Guide," prior to beginning the assignment to become familiar with the expectations for successful completion.

Coursework Sample Content Preview:

Encryption Features
Author’s Name
Institutional Affiliation
Course Code and Name
Professor’s Name
Date

Encryption Features
Linux and Microsoft Windows use different encryption features to safeguard stored data. BitLocker is the primary encryption feature in Microsoft Windows. Indeed, it was designed to provide high-level encryption for files and folders. BitLocker uses the Advanced Encryption Standard (AES) algorithm as a cipher blocking chain with 256-bit or 128-bit key (Salah et al., 2013). When it comes to Linux, it uses a one-way data encryption algorithm known as the Data Encryption Standard (DES) for password encryption. Other encryption tools that can be used in Linux are Tomb, CryFS, GnuPG, VeraCrypt, EncFS, and Cryptmount.
The best encryption features for my organization are the AES and the Triple Data Encryption Standard (3DES). Specifically, AES is more secure, and security firms and governments usually use this encryption feature to safeguard classified information. The best thing about AES is that it uses symmetric key encryption, which means that the receiver of the message or data must have the key to decode the information (Koko & Mustafa, 2015). 3DES is another secure encryption feature that can be used in my organization. Indeed, as its name suggests, it uses three 56-bit keys for data protection. Although it takes longer to encrypt data using 3DES, shorter block lengths are mainly encry...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Coursework Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!