close
test_template

The Core Items of Cryptography and Encryption

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 586 |

Page: 1|

3 min read

Published: Dec 5, 2018

Words: 586|Page: 1|3 min read

Published: Dec 5, 2018

Table of contents

  1. Introduction
  2. Confidentiality
  3. Integrity
  4. Availability

Introduction

There are three core items that Cryptography and encryption attempt to protect and preserve and is often referred to as the CIA Triad. Please identify and describe each of the three elements of the CIA Triad and provide a real-world example (it can be hypothetical or real) of how cryptography and encryption can be applied. CIA referred to as Confidentiality, Integrity, and Availability, It is a representation designed to protect policies for data security within a firm.

Confidentiality is a set of regulations that control access to the data, integrity is the guarantee that the data is reliable or trustworthy and realistic, and Availability is an assurance of trustworthy approach to the data by accredited people.

Confidentiality

Confidentiality is abruptly identical to privacy. Measures undertaken to assure confidentiality and these are made to prevent sensitive information from reaching the unwanted people. Approximately, Stringent measures are taken, that can be implemented according to those categories. Access can be confined for those who authorized to view the information and also for data can be classified according to the type of damage that could be done must fall into unintended hands.

Example of a method used to ensure confidentiality is an account number or routing number when making online banking. Data encryption is a type of method of ensuring understanding. Other options include Security Tokens and Biometric Verification. User confidential constitute a standard procedure; two-factor authentication becoming normal.

Integrity

Integrity mainly maintains the few things like accuracy, consistency, and reliability of data over its entire lifecycle. In transit, data must not be changed and severe rules should be followed to guarantee that the information cannot be modified by unauthorized or unaccredited people, we can say in a breach of confidentiality includes user access controls and file permissions.

Examples of this integrity are version control might be utilized to avoid erroneous modifications or unexpected deletion by unauthorized users becoming an obstacle. Sometimes to detect any changes in data that may occur as an output of non-human caused events like electromagnetic pulse or server crash and also even cryptographic checksums for verifications of integrity.

Availability

Availability is the foremost ensure by maintaining all hardware and when required it also performs hardware repairs and maintains a well functioning operating system that should be free of software conflicts. Safeguards against interruptions or loss of information in connections and these include some events like fire and natural disasters. Solution to prevent data loss from unpredictable situations, a backup copy might be stored in a geographically isolated location, maybe even in a waterproof, fireproof safe. Security software includes proxy servers and firewalls can guard against unreachable information such as DOS(Denial Of Service) and intrusions of a network.

One of the Challenges:” Internet of Things security” is also a special challenge because the IoT comprises of so many Internet-enabled devices other than computers, Which often configured with default or weak passwords and also go unmatched. Unless adequately protected, IoT things could be used as separate attack vectors. For example, researchers demonstrated that a network could be compromised through a Wi-Fi-enabled light bulb.

Get a custom paper now from our expert writers.

In December 2013, an enterprise security firm, a researcher at Proofpoint discovered that hundreds of thousands of spam emails were being logged through a security gateway. Proofpoint traced the attacks to a botnet made up of 100,000 hacked appliances. As more and more products are developed with the capacity to be networked, it’s important to routinely consider security in product development.

Image of Alex Wood
This essay was reviewed by
Alex Wood

Cite this Essay

The Core Items of Cryptography and Encryption. (2018, December 03). GradesFixer. Retrieved December 24, 2024, from https://gradesfixer.com/free-essay-examples/the-core-items-of-cryptography-and-encryption/
“The Core Items of Cryptography and Encryption.” GradesFixer, 03 Dec. 2018, gradesfixer.com/free-essay-examples/the-core-items-of-cryptography-and-encryption/
The Core Items of Cryptography and Encryption. [online]. Available at: <https://gradesfixer.com/free-essay-examples/the-core-items-of-cryptography-and-encryption/> [Accessed 24 Dec. 2024].
The Core Items of Cryptography and Encryption [Internet]. GradesFixer. 2018 Dec 03 [cited 2024 Dec 24]. Available from: https://gradesfixer.com/free-essay-examples/the-core-items-of-cryptography-and-encryption/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now