Essay Available:
Pages:
1 page/β275 words
Sources:
Check Instructions
Style:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 5.4
Topic:
Types of Securing and Encrypting Email
Essay Instructions:
Information Security Management Course Work
Case Project : Securing Email
Use the Internet to research different options for encrypting and securing email.
1. Create a table that lists at least five options. Include the advantages and disadvantages of each. Which would you recommend? Why?
2. Write a one-paragraph explanation along with your table.
Do your own work and make sure you answer all the questions.
It will submit on the Turnitin.
Submission will be sent to Turnitin to be electronically reviewed for plagiarism.
Essay Sample Content Preview:
Information Management Security
Student’s Name
Institutional Affiliation
Information Management Security
Types of Securing and Encrypting EmailDescriptionAdvantagesDisadvantagesEncryption in transitIt uses the Transport Layer Security (TLS) to protect email data against snooping or eavesdropping while in transit from one server to another (Puthal et al., 2019). Easy to use.
Protects email data while in transit.
Enhances fast opening of email data.It does not encrypt data that is stored on servers.
It does not safeguard email data on recipients’ devices.Enterprise email encryptionThis method ensures that encryption is transparent for users by enabling email client application. Encryption is occurs as software in the company’s email server.
Offer additional features.
Enables users to manage their encryption keys.Messages on the device are not encrypted.
Encryption occurs if the receiver’s email server supports the software.DIY email encryptionThe encryption uses the concept where users can create a private and public key. Users know their encryption keys.
Protects email data in transit and on servers.Difficult to set up.
The email sender must exchange his or her passphrase with data recipients.
Recipients might find it difficult to use (Puthal et al., 2019). EncyroIt secures email data in transit, on servers, and on devices.Users can send encrypted messages without signing up for...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
π Other Visitors are Viewing These APA Essay Samples:
- Information Security Management Course Work IT & Computer Essay1 page/β275 words | APA | IT & Computer Science | Essay |
- AI Face Recognition Technic In Public Camera. IT & Computer Essay 5 pages/β1375 words | APA | IT & Computer Science | Essay |
- Types of Firewalls1 page/β275 words | APA | IT & Computer Science | Essay |
- Target Data Breach: Cybercriminals3 pages/β825 words | 1 Source | APA | IT & Computer Science | Essay |
- Professional Ethics about Computer Hacking2 pages/β550 words | 2 Sources | APA | IT & Computer Science | Essay |
- Game Design Proposal and the Five Elements of Games14 pages/β3850 words | APA | IT & Computer Science | Essay |
- Malware Analysis: Malicious Software8 pages/β2200 words | 4 Sources | APA | IT & Computer Science | Essay |