Sign In
Not register? Register Now!
Pages:
4 pages/≈1100 words
Sources:
3 Sources
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.6
Topic:

Security via Technology

Essay Instructions:

Security via Technology
Assignment Overview
As mentioned in the module's home page, the topic "Security via Technology" could be a course of its own. There is no way to cover virus protection, firewalls, anti-spam software, passwords, digital rights management, etc., in this one course. But we can focus on a general-purpose technology that can be applied in many security measures.
The following presentation covers the basic concept of cryptography. It can be hard to understand without explanation. Support your research by searching and reading on the Internet.
Wang, Wenli. PowerPoint presentation. Security via Cryptography.
The following simply write-up can help you too:
Wang, Wenli. A simple writing on What is encryption and SSL?
There is risk associated with any technological remedy to security problems. Read the following article from which you can learn about the subject from other angles.
Ellison C. and Schneier B. (2000) Ten Risks of PKI: What You're Not Being Told About Public Key Infrastructure. Computer Security Journal, v 16, n 1, 2000, pp. 1-7. http://www(dot)schneier(dot)com/paper-pki.pdf.
This is the first time in this course that we look into details of a solution rather than take a bigger perspective. I hope you understand the difference between a macro approach and micro approach. They should be applied complementarily. As a manager or a policy maker, you should understand micro issues, but more importantly, you should have the bigger perspective. Technicians can handle the details. However, you need to understand their language and know what they mean rather than understand the details at the "buzzword" level.
So, as a manager and policy maker, let's look into the bigger picture again. This time, let's look at the past and future of information security:
Diffie, Whitfield. (2008) Information Security: 50 Years Behind, 50 Years Ahead. Communications of the ACM, 51(1), 55-57. (TUI online library)
You also need to keep yourself abreast of the new innovations and where to find them. The following two and the list I provided in the module's home page are only the start. Visit these websites and bookmark the ones that you find interesting. Equipped with the frameworks and principles and several lenses, you can make your own judgment on the quality of an information source and know how that source focuses on different levels of analysis. 
Current activity report of the latest security incidents, US-CERT. Retrieved from http://www(dot)us-cert(dot)gov/ncas/current-activity
Computer Emergency Readiness Team Makes Progress in Securing Cyberspace, but Challenges Remain. (2010). Retrieved from http://www(dot)oig(dot)dhs(dot)gov/assets/Mgmt/OIG_10-94_Jun10.pdf
Please write a 3- to 4-page paper discussing what you have learned:
Describe public-key cryptography and write a comparative analysis of its pros and cons. Provide a comparison of the pros and cons of solving security issues via technology. Discuss trends in information security technology and the impact they may have on society.
Use your own words. There are many sources on cryptography on the Internet. Do not cut and paste, but explain in your own words. Only in this way can you fully digest what you have learned. Write as if you are explaining the subject to your colleagues or co-workers.
When you discuss the trends in information security, use the suggested article as a reference. Your own opinions are always welcome. Please be clear, comprehensive, and in-depth.
Assignment Expectations (50 points total)
Length: Minimum 3–4 pages excluding cover page and references (since a page is about 300 words, this is approximately 900–1,200 words).
Assignment-driven criteria (25 points): Demonstrates clear understanding of the subject and addresses all key elements of the assignment.
Critical thinking (10 points): Demonstrates mastery conceptualizing the problem. Shows analysis, synthesis, and evaluation of required material.
Scholarly writing (5 points): Demonstrates writing proficiency at the academic level of the course; addresses the Learning Outcomes of the assignment.
Quality of references (4 points) and assignment organization (3 points): Uses relevant and credible sources to support assertions. Assignment is well organized and follows the structure of a well-written paper.
Citing sources (3 points): Uses in-text citations and properly formats references in APA style.

Essay Sample Content Preview:

Security via Technology
Name:
Course:
Instructor’s Name:
Date:
Security via Technology
Before investing in new security measures, consideration on the choice of the system and the technology requirement comes in handy depending on various factors such as finance, level of confidentiality and many others. Technology trends influence security in various ways through the internet that may result to strengthening the company security systems or wreaking it and thus creating loopholes. Success of businesses lies on the department of security, without super and active systems on security line the company may suffer badly on the hands of competitors and other watchdog bodies.
The following security measure systems will focus on protecting information over the internet on the company market structure, business models, labor market, private life, education and the general society.
Let us consider public-key cryptography
What is public key cryptography?
Public key cryptography use two separate keys where one is private and the other public. Public key cryptography, also asymmetric cryptography uses two non-identical mathematical keys to encrypt information. It is different from symmetric key, which uses only one key to encrypt and decrypt. The private key decrypts while the public key encrypts. Public keys can be shared with different users to allow them encrypt and verify contents digital signatures with easy and convenient, while the private keys are kept secret for the owners ensuring only them can decrypt contents and create signatures.
For secure transporting and sharing of public keys, they are stored in the digital certificates. They are also too large to remember. Private keys are stored in operating system, hardware (such as USB tokens) or software that are installed drivers that allow one to use with the operating system or software with the key CITATION USC15 \l 1033 (US-CERT, 2015).
The major business applications for public key cryptography include digital signatures and encryption. In digital signatures, all the content signed digitally by the owner with a private key and verified by the public key by the owner. For encryption, the individual who encrypted it using the public key can only decrypt content with the private key CITATION Dif08 \l 1033 (Diffie, 2008).
Digital Signatures Security Benefits.
If the private key remains a secret and the only person with access to it is the person that it was issued to, the digital signing of documents and emails will offer the following.
Integrity- verification of the signature will always verify that the content of the message is what is there as during the application of the signature. Slightest altering of the original content will lead to failure of the verification.
Authentication- recipient can be confident that the individual applied the signature, since the private key was used to apply the signature.
Non-repudiation- the person with access to the private key cannot later deny that the key was not used in the signature application.
Encryption Security Benefits
Assuming the private key holder has not compromised, the encrypted information offers security benefits such as-
Confidentiality- the only viewer of the en...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!