Sign In
Not register? Register Now!
Pages:
3 pages/≈825 words
Sources:
7 Sources
Style:
APA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 19.44
Topic:

Technology of Information Security

Coursework Instructions:

Case Assignment
Please prepare a 3- to 5-page paper addressing the question:
Is using an encryption system like PGP a good idea for individuals and organizations? And why?
Assignment Overview
To assure a trusted and resilient information and communications infrastructure, it is essential to secure the computer networks. Computer networks are implemented via technology. Part of solutions of their security in essence need to be via technology as well. The following two presentations provide the security protocols common in computer networks.
Kizza. Computer Network Security Protocols and Standards. Presentation.
Perlman, R. (2004), Network Security Protocols: A Tutorial. Presentation.
As you see from the presentations, to understand computer network security protocols, it is important to understand what cryptography is, as it is the building block of security protocols. The following reading provides a thorough review:
Kessler, G. (2011). An overview of cryptography. Retrieved from http://www(dot)garykessler(dot)net/library/crypto.html
If one is new to cryptograph, it takes some time for one to understand it. Maybe some hands-on practice will be helpful. You don't have to get it all figured out, but give it a try. You may find it interesting.
There's a program out there called Pretty Good Privacy (PGP), that provides personal encryption capabilities essentially equal to those available to almost all governments and capable of ensuring information privacy against almost if not absolutely all attacks. It has a long and interestingly checkered history, including having been at one time an illegal munition of war. Originating as freeware, it now exists in both free and commercial incarnations.
You'll also want to look at the discussion and links to some versions of the program on Phil Zimmermann's website (http://philzimmermann(dot)com/EN/findpgp/) and at the GNU Privacy Guard website (http://www(dot)gnupg(dot)org/), which provides a free implementation on the Open Source model.
Now you have been exposed to technical solutions to security. Please also understand the challenges afflicated with technical solutions. The following article pinpoints the forever challenge to technology:
Schneier, B. (2012), How Changing Technology Affects Security. IEEE Security & Privacy. March/April 2012.
When you've had a chance to review these materials, do any other research on the topic that you find helpful, and think about the issues involved.
Case Assignment
Please prepare a 3- to 5-page paper addressing the question:
Is using an encryption system like PGP a good idea for individuals and organizations? And why?

Coursework Sample Content Preview:

IT Security Technologies
Name:
Institution:
Course:
Date:
IT Security Technologies
Technology plays a subtle part in individuals’ lives and organizations alike (Schneier, 2012). People and organizations are both able to share and store important information that is sensitive, which they can access from anywhere in the world and using different platforms that exist (Perlman, 2004). With the rise of technology, hackers and malicious persons have also been on the rampage using the internet to make personal, political, social and economic scores. Issues such as identity theft and corporate/industrial/economic espionage (Gnupg.org, 2015).Cryptography has become one crucial science in the IT sector, for the individuals and organizations. Cryptography dates back to the 1900 B.C. and can be traced to Egypt, where an Egyptian had used hieroglyphs which were not standard (Kessler, 2015). It is thus a science that involves using secret codes to hide certain information. There are some specific requirements that are basic to application communications. These include; authentication, privacy, integrity, non-repudiation. Using mathematical algorithms, data is encoded and makes it inaccessible to other persons other than the intended parties.
Pretty good privacy
As it is commonly referred to, PGP, is one of the most advanced encryption that uses public key encryption scheme to create a secure communications. Using the public key that is tied to a specific user, the receiver can then use their key to decrypt the message. This means that is quite secure relative to the fact that, one needs the key to decrypt the message and the keys are password protected. For individuals that are concerned about their privacy online PGP is a secure way of ensuring that what they share among each other is not unsafe from prying eyes (Articsoft.com, 2015). One may want to send bank details to their spouse or even any other family member and relative to sensitivity of this information, using the PGP, would ensure that only the intended persons get to open the email. At the company level it is crucial for the sender and the recipient to maintain confidentiality of their information. If the information being passed between the users is on the financial projects, new drug formula or new engine designs among other items that need to stay confidential, using the PGP will guarantee the security of the same from prying eyes (Albright, 2014).
It also offers the two parties the element of integrity of the information that is being passed along. Using digital signatures, parties are able to sign their messages digitally using their private key. This mea...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Coursework Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!