logo

Network Security: Cryptography, Data in Transit and Rest, Cloud Computing

   

Added on  2022-11-19

10 Pages1928 Words459 Views
Running head: NETWORK SECURITY
1
Network security
Student name
Institution name
Date

NETWORK SECURITY
2
Executive summary
Technology on information systems has evolved. The security measures used traditionally has
been replaced with more robust ones. The security of information in the organization system is
vital, owing to the impact of information leakage. The report herein is committed to giving an
insight into modern and robust information security systems.

NETWORK SECURITY
3
Table of Contents
Introduction................................................................................................................ 3
Cryptography.............................................................................................................. 3
How cryptography keeps data secure........................................................................3
Symmetric encryption................................................................................................ 3
Asymmetric encryption.............................................................................................. 4
Purpose of symmetric and asymmetric encryption on data and messages................4
Data in transit............................................................................................................. 4
How to share data in transit safely.............................................................................4
Recommended cryptography for data on transit........................................................5
Reason.................................................................................................................... 5
Data in rest................................................................................................................. 5
Recommended cryptography..................................................................................... 5
Justification.............................................................................................................. 5
Message authentication.......................................................................................... 5
Symmetric message encryption................................................................................. 5
Asymmetric message encryption...............................................................................6
Digital signature......................................................................................................... 6
User authentication.................................................................................................... 6
Most recommended encryption..................................................................................6
Symmetrical encryption............................................................................................. 6
Key distribution.......................................................................................................... 7
Recommendation for software................................................................................... 7
ProtonMail............................................................................................................... 7
Justification................................................................................................................. 7
Possibility of employing cloud computing on valuable data.......................................7
Recommended cloud computing................................................................................ 8
Security risks.............................................................................................................. 8
Justification for using cloud computing.......................................................................8
Conclusion.................................................................................................................. 8
Reference................................................................................................................... 8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Encryption Symmetric Key Encryption
|9
|2853
|351

Hybrid Encryption
|4
|798
|8

Security in Information Technology | Assignments
|13
|3545
|119

Uses Of Cryptography Techniques
|8
|3872
|245

Cryptography and Network Security Applications
|8
|1917
|96

Cryptography Algorithm
|11
|2443
|35