Network Security: Cryptography, Data in Transit and Rest, Cloud Computing
Added on 2022-11-19
10 Pages1928 Words459 Views
Running head: NETWORK SECURITY
1
Network security
Student name
Institution name
Date
1
Network security
Student name
Institution name
Date
NETWORK SECURITY
2
Executive summary
Technology on information systems has evolved. The security measures used traditionally has
been replaced with more robust ones. The security of information in the organization system is
vital, owing to the impact of information leakage. The report herein is committed to giving an
insight into modern and robust information security systems.
2
Executive summary
Technology on information systems has evolved. The security measures used traditionally has
been replaced with more robust ones. The security of information in the organization system is
vital, owing to the impact of information leakage. The report herein is committed to giving an
insight into modern and robust information security systems.
NETWORK SECURITY
3
Table of Contents
Introduction................................................................................................................ 3
Cryptography.............................................................................................................. 3
How cryptography keeps data secure........................................................................3
Symmetric encryption................................................................................................ 3
Asymmetric encryption.............................................................................................. 4
Purpose of symmetric and asymmetric encryption on data and messages................4
Data in transit............................................................................................................. 4
How to share data in transit safely.............................................................................4
Recommended cryptography for data on transit........................................................5
Reason.................................................................................................................... 5
Data in rest................................................................................................................. 5
Recommended cryptography..................................................................................... 5
Justification.............................................................................................................. 5
Message authentication.......................................................................................... 5
Symmetric message encryption................................................................................. 5
Asymmetric message encryption...............................................................................6
Digital signature......................................................................................................... 6
User authentication.................................................................................................... 6
Most recommended encryption..................................................................................6
Symmetrical encryption............................................................................................. 6
Key distribution.......................................................................................................... 7
Recommendation for software................................................................................... 7
ProtonMail............................................................................................................... 7
Justification................................................................................................................. 7
Possibility of employing cloud computing on valuable data.......................................7
Recommended cloud computing................................................................................ 8
Security risks.............................................................................................................. 8
Justification for using cloud computing.......................................................................8
Conclusion.................................................................................................................. 8
Reference................................................................................................................... 8
3
Table of Contents
Introduction................................................................................................................ 3
Cryptography.............................................................................................................. 3
How cryptography keeps data secure........................................................................3
Symmetric encryption................................................................................................ 3
Asymmetric encryption.............................................................................................. 4
Purpose of symmetric and asymmetric encryption on data and messages................4
Data in transit............................................................................................................. 4
How to share data in transit safely.............................................................................4
Recommended cryptography for data on transit........................................................5
Reason.................................................................................................................... 5
Data in rest................................................................................................................. 5
Recommended cryptography..................................................................................... 5
Justification.............................................................................................................. 5
Message authentication.......................................................................................... 5
Symmetric message encryption................................................................................. 5
Asymmetric message encryption...............................................................................6
Digital signature......................................................................................................... 6
User authentication.................................................................................................... 6
Most recommended encryption..................................................................................6
Symmetrical encryption............................................................................................. 6
Key distribution.......................................................................................................... 7
Recommendation for software................................................................................... 7
ProtonMail............................................................................................................... 7
Justification................................................................................................................. 7
Possibility of employing cloud computing on valuable data.......................................7
Recommended cloud computing................................................................................ 8
Security risks.............................................................................................................. 8
Justification for using cloud computing.......................................................................8
Conclusion.................................................................................................................. 8
Reference................................................................................................................... 8
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Encryption Symmetric Key Encryptionlg...
|9
|2853
|351
Hybrid Encryptionlg...
|4
|798
|8
Security in Information Technology | Assignmentslg...
|13
|3545
|119
Uses Of Cryptography Techniqueslg...
|8
|3872
|245
Cryptography and Network Security Applicationslg...
|8
|1917
|96
Cryptography Algorithmlg...
|11
|2443
|35