Cryptography and Computer Security Introduction Security in the general context refers to protect anything from getting stolen or damaged. Likewise, computer security relates to the security and protection of the computer data and information(ITL Education Solutions, 2012). The first example of computer security can be seen when the computerized switchboard was introduced to protect hardware from external damage in 1976. Then protection was developed to safeguard remote computing, and this was done by establishing the modem. In the 1980’s another problem arose when personal computers were designed, this also brought an introduction to the internal issues, i.e., virus from which the PC needed protection. Matters continued to emerge, but the most severe problem came with the introduction of the internet. Internet gave rise to many questions because the internet gave rise to many virtual access points. Access points are an entrance to every sort of information and along with the information that enters virus and other malware can easily join(Stinson, 2016). This opened a gateway to many virus and unwanted material into the computer. To protect the network from such threats many techniques and methods were adopted, and up till now new techniques and soft wares are being developed to protect the system. One such way of protecting data is cryptography. It was used to convert readable data into data that cannot be understood. In the earlier years cryptography was used to protect and secure information and messages between essential personnel, but gradually encryption began to be used for the protection and safety of all sorts of communication and safe computing(Stinson, 2016).
Cryptography Cryptography has generally been used widely, and there are some keys that are written for the public, and the primary reason is to protect the data that is being transferred that is why it usually remains a secret or a matter of confidentiality between the receiver and the sender. It is a matter of great concern for the government and especially the law enforcing agencies when the data is encrypted as they need to be better equipped with programs and software to be counter the encrypted data and be able to read it(Anderson & Rane, 2017). This is the sole reason that previously there was such a hue and cry with relations to the matter of privacy. It was discovered that no mail or communication was hidden from them. They had super software and supercomputers to help them decode the algorithms and be able to decipher it. Cryptography is the process of transforming a text that isapparently into the incomprehensible format. Business enterprises predominantly use encryption during their storage and transmission of messages carefully for reading by the intended recipients(Buchanan, 2017). Cryptography has several applications and methods. In the past, it was used in assuring secrecy. The authenticity of the sender and integrity of the media were secured through the use signatures, wax, and other physical attributions. However, the introduction of electronic transfer transformed the use of cryptography into electronic cash. This led to the emergence of debit and credit cards whose applications have since become widespread. This age of information has witnessed the development of cryptography a significant protection method of applications(Dooley, 2013).
Security threats associated with Cryptography and countermeasures (i)VIRUSES They are one of the most common forms of infections that appear in the system. They had earlier become common thorough floppies, but now newer sophisticated means have been found and developed. Today they can enter the system through the use of the internet. They are usually in the form of an executable file, that when run copies itself over and over again and infects the programs (Gollmann, 2011). The virus is also transmitted through flash drives and emails as well. PREVENTION - The system can easily be protected by using an antivirus program that has an active database of viruses this way the virus can be detected as soon as it enters. The most straightforward solutions for viruses are the antivirus software. For example Norton Antivirus, Avira Antivirus, etc. Also, be careful in using the flash drives unprotected can also cause the virus to expand. (ii)WORMS They are also a variation in the kind of virus. Viruses usually come from some external source, but the worms are transmitted through a network(In Blythe, 2013). Once transferred the worms exploit the security holes that might exist in the network and load the system process by running as a separate process. This way the extra burden on the processor causes the system to crash. PREVENTION-The best way to protect the system from worms is to update the system with the security patches; this way the worm will not have a chance to attack the system. Also antivirus and antimalware software help but they are not very useful in preventing the attacks.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
(iii)TROJAN Trojan is a program that looks desirable and entices the user to install it, once installed it releases worms and viruses which infect the files and data stored on the system(Kim, 2016). They are usually deceptive downloads that the user unknowingly downloads. Also many a times spyware are attached to Trojans who then lodge themselves into the system making the system malfunction. PREVENTION - To have anti-spyware software installed in the system prevents the advent of Trojans and also being careful while downloading unlicensed software can help stop the invasion by Trojans. (iv)ROOTKITS Rootkits are software that is very difficult to be located by any phishing software. They run as a legitimate system process and are tough to be found out(Oppliger, 2011). PREVENTION -By knowing the proceeds that are currently running, a user can identify the rootkit and get rid of it. But the only other way is to reinstall the operating software.
References Anderson, & Rane. (2017).Cryptography. Turtleback Books. Buchanan,W. (2017).Cryptography. Aalborg: River Publishers. Dooley,J. (2013).A brief history of cryptology and cryptographic algorithms. Gollmann,D. (2011).Computer security. Chichester, West Sussex: Wiley. In Blythe,J. (2013).Financial Cryptography and Data Security: FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. New York: Springer. ITL Education Solutions. (2012).Cryptography and network security. New Delhi: Dorling Kindersley (Indian)/Pearson. Kim,K. (2016). Cryptography: A New Open Access Journal.Cryptography,1(1), 1. doi:10.3390/cryptography1010001 Oppliger,R. (2011).Contemporary cryptography. Boston: Artech House. Stinson,D.R. (2016).Cryptography. Place of publication not identified: Crc Press.