This website uses cookies to ensure you have the best experience. Learn more

Computer Security, Defines Encryption And Explain How It Is Used To Protect Transmission Of Information

886 words - 4 pages

1Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.The other method is Transposition (rearrangement characters) which is the encryption process in which units of the original plain text (usually individual characteristics) are simply moved around; they appear unchanged in the cipher text for their relative location.Study Case (Bank of Shenandoah Valley)While both encryption and authentication method are providing some measures of security, the implementation of security itself has totally a different approach. Before any methods chosen, the two most important factors in security implementations are having to be determined. The level of security needed and the cost involved, so the appropriate steps can be taken to ensure a safe and secure environment. In this case Bank of Shenandoah Valley is in type of business which a high level of security is required, therefore, I would suggest the use of encryption method with a complex algorithm involved. Although an authentication method is a secure method as well, is not as complex as encryption method of complex algorithm since it has been used in military during the war where a high levels of security are a must. During the war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. This is a perfect example of how reliable an encrypted message can be while used within its appropriates guidelines.Chapter # 64- Describe the three different database models - hierarchical, relational and network.For data to be effectively transformed into useful information, it must be organized in a logical, meaningful way. Data is generally organized in a hierarchy that starts with the smallest unit (or piece of data) used by the computer and then progresses into the database, which holds all the information about the topic. The data is organized in a top - down or inverted tree likes structure. At the top of every tree or hierarchy is the root segment or element of the tree that corresponds to the main record type. The hierarchical model is best suited to situations in which the logical relationship between data can be properly presented with the one parent many children (one to many) approach....

Find Another Essay On Computer Security, Defines encryption and explain how it is used to protect transmission of information

The History of Cryptography and How it is Used Today

1438 words - 6 pages it is the means to encrypt data from unauthorized access (Sundt, 2010). Protecting networks, systems and email through data encryption has been fairly widely accepted for quite some time in businesses. Instant messaging, though, has been traditionally perceived as a casual communication method not used in business, so the need to apply cryptographic methods to this form of electronic communication has not been deemed a priority. However

In this essay I am going to express my views on the bad aspects of TV, and explain what they are. Possibly, this essay may change your views on TV and how it is used

678 words - 3 pages In this essay I am going to express my views on the bad aspects of TV, and explain what they are. Possibly, this essay may change your views on TV and how it is used.The truth is that most TV shows suck. This is especially true in so-called "situation comedies". The reason they have to add that stupid laugh track is so you know what part is 'supposed' to be funny. If you'll notice, the funniest and most successful shows don't usually have laugh

Is it the government's obligation to ensure and protect every citizen's pursuit of happiness?

733 words - 3 pages to things such as terrorist attacks and criminal activities in order to keep its people free from worries. If a person does not feel free, it would be impossible for that person to live life to the fullest and pursue personal happiness. The government must also protect the unalienable rights of its people to ensure complete independence and freedom. The reason that Americans are much happier than people under Communist rule is because the

This report explain what is marijuana and how people think of it. It also explain how it is a drug use for many years and smuggle here to U.S

903 words - 4 pages harm to the user is marijuana. Naturally, it remains illegal. Provided by the "High Times" website.Marijuana is one of the oldest and widely used drugs in the world. It is the second most popular intoxicant, next to alcohol. There are two hundred million users in the country, and sixty million say that they have tried it. Only 40% of high school students graduated in 1995 without ever trying it. Approximately 33% of people who try it become

The word "plagiarism" is and how it is used

792 words - 3 pages . Even if it's not exactly word for word, it still needs to be quoted and footnoted so that your reader understands that it was another's general idea. The last example of plagiarizing is called the mosaic. The mosaic is when the writer of the essay uses his or her own words, but throughout the paragraph puts in phrases that someone else has used. A mosaic is kind of like a weave of their own work mixed with others.Rather than plagiarizing, there

Explain the concept of socialization and how useful is it in understanding human behavior?

1360 words - 5 pages Explain the concept of socialization and how useful is it in understanding human behavior?Socialization is the process in which an individual learns the way of life of his/her society, learn the trick of the trade and develops the capacity and the potential to function both as an individual and as a member of the society by internalizing the culture in which the society is based on. Socialization is a life-long process occurring at all stages in

Security, Storage and Transmission of Electronic Digital Images

2439 words - 10 pages , which demand significant protection of users' privacy for all those applications. Encryption and steganography techniques of digital images are extremely important and should be used to frustrate opponent problems from unauthorized access (Mitra et ing, 2006), (Shujun et ing, 2002), (Lee et ing, 2003). Digital images are exchanged over various kinds of networks. It is normally true that a large component of this information is often

Media Law and Ethics- How it is used in journamlism

2005 words - 8 pages ambulance.However, the ethical problem lied with Kochie deciding to use the departing ambulance to exploit him being socially connected to someone who was part of his story. It would also be relevant to address Point 8 of the MEAA Code which describes the importance of using "fair, responsible and honest means to obtain material" and to never capitalize a person's vulnerability. This point discusses further ethical standards and how there is room

Health and Nutrition. This essay is a paper mainly used for a health class. It talks about how to take care of yourself by excercising and eating right

1410 words - 6 pages necessary to do it almost every day. The longer that you slack off, the more you are going to be out of shape. Your body requires that almost daily basis of workout once it gets used to it. If you don't work out almost every day after your body is used to it, then it will feel very tired and uncomfortable when you don't work out. Even though you may not realize that your body feels better after working out, it still does. This is because it works

How To Operate a Stick Shift Transmission. It is a process essay that could use a better thesis statement

731 words - 3 pages operate a stick transmission. The best place to practice and learn how to drive a stick transmission is in a large, open vacant parking lot.The learner should next familiarize themself with the differences between a stick shift transmission and an automatic transmission. In the parking lot with the vehicle's engine turned off, apply the right foot to the brake pedal, and practice getting a feel of the clutch pedal by pushing it in and out with your

How does IR Theory explain the United Nation’s contribution to the maintenance of international peace and security?

2039 words - 9 pages How does IR Theory explain the United Nation’s contribution to the maintenance of international peace and security? “More than ever before in human history, we share a common destiny. We can master it only if we face it together. And that is why we have the United Nations.” (Annan: 2001) It is generally considered that international organisations ought to stand accountable for the preservation of global stability and peace, be this

Similar Essays

Security Features To Protect Your Checks From Being Used Fraudulently

603 words - 3 pages three of those safety features. Some of the commonly used security features may include microprint security, watermarks, holograms, laid lines, void pantographs, prismatic printing, ultraviolet ink, bleed through numbering, invisible fluorescent fibers, border copy warnings and the security screen. Micro-security print is a very small print that will break up if someone attempts to photocopy or scan the check. It is typically used for the

Explain Monetary Policy And How/Why It Is Used To Regulate Australia's Economy

1167 words - 5 pages With today's market becoming increasingly deregulated, privatised and capitalist, the government has seen a dramatic loss of economic control in recent years. Monetary Policy is one of the government's strongest influential tools of the modern economy so that if it may promote:·Stability of the Australian currency·Full employment·Economic prosperityIt is the duty of the Reserve Bank of Australia (RBA) to use Monetary Policy

Explain What Is Meant By The Term 'social Construction' And Consider How It Has Been Used To Further Our Understanding Of The Concept Of Identity

1162 words - 5 pages According to social construction it is through social interactions that people "act and react in relation to others, through these social interactions we learn what is acceptable and what is not. Over time these rules become internalized within us, and eventually become an unconscious part of our lives and our identity. It is the aim of this essay to explain what is meant by the term 'social construction' and how social construction has

Environment Is Life So Make The Most Of It]\ Ulshs How To Save And Protect Our Environment

1218 words - 5 pages monks and established twelve monasteries with twelve monks each in the area south of Rome. Later, perhaps in 529, he moved to Monte Cassino, about eighty miles southeast of Rome; there he destroyed the pagan temple dedicated to Apollo and built his premier monastery. It was there too that he wrote the Rule for the monastery of Monte Cassino though he envisioned that it could be used elsewhere. The thirty-eight short chapters of the Second Book of