blog




  • Essay / The Fundamentals of Cryptography and Encryption

    Table of ContentsIntroductionConfidentialityIntegrityAvailabilityIntroductionThere are three fundamental elements that cryptography and encryption attempt to protect and preserve and are often referred to as the CIA triad. Please identify and describe each of the three elements of the CIA triad and provide a concrete example (it can be hypothetical or real) of how cryptography and encryption can be applied. CIA called confidentiality, integrity and availability. It is a representation designed to protect data security policies within an enterprise. Say no to plagiarism. Get a tailor-made essay on “Why violent video games should not be banned”?Get the original essayPrivacy is a set of regulations that control access to data, integrity is the guarantee that the data is reliable and trustworthy and realistic, and availability is a guarantee of a reliable approach to the data by accredited persons. Confidentiality Confidentiality is abruptly the same as private life. Steps are taken to ensure confidentiality and these are taken to prevent sensitive information from reaching unwanted people. Basically, strict measures are taken, which can be implemented based on these categories. Access can be limited to those who are authorized to view the information and the data can also be categorized based on the type of damage that could be caused and should fall into unwitting hands. An example of a method used to ensure confidentiality is an account number or routing number. during online banking transactions. Data encryption is a type of method to ensure understanding. Other options include security tokens and biometric verification. User confidentiality is standard procedure; two-factor authentication becomes normal.IntegrityIntegrity mainly maintains the few things such as data accuracy, consistency, and reliability throughout its lifecycle. In transit, the data must not be modified and strict rules must be followed to ensure that the information cannot be modified by unauthorized or unaccredited persons, a breach of confidentiality can be said to include data controls. User access and file permissions. Examples of this integrity are version control can be used to prevent erroneous changes or unexpected deletion by unauthorized users from becoming an obstacle. Sometimes to detect any changes in data that may occur as a result of non-human caused events, such as an electromagnetic pulse or server crash, as well as even cryptographic checksums for integrity checks. AvailabilityAvailability is the main guarantee in maintaining all hardware and when necessary it also performs hardware repairs and maintains a properly working operating system free from software conflicts. Protections against interruptions or loss of information in connections, including certain events such as fires and natural disasters. A solution to prevent data loss due to unpredictable situations, a backup copy can be stored in a geographically isolated location, perhaps even in a waterproof and fireproof safe. Security software includes proxy servers and firewalls that can protect against inaccessible information such as DOS (Denial Of Service) and network intrusions. One of.