Thursday, May 2, 2019

Cryptography and Computer Security Essay Example | Topics and Well Written Essays - 2250 words

Cryptography and Computer credential - Essay Examplevirus from which the computer needed cling toion. Issues continued to arise but the most secure problem came with the introduction of internet. Internet gave birth to many problems because the internet gave rise to many virtual plan of fervency points. Access points are an entrance to every sort of information and along with the information that enters virus and some other malwares can easily enter. This opened a gateway to many virus and unwanted material into the computer. In order to protect the computer from such threats many techniques and methods were adopted and up till now forward-looking techniques and soft wares are being developed to protect the computer. One such method of protecting info is cryptogram. It was employ to convert understandable entropy into data that cannot be understood. In the earlier years cryptanalytics was used to protect and secure information and messages between important personnel but gradually cryptography began to be used for the protection and safety of all sorts of conversation and safe computing. CRYPTOGRAPGY Cryptography has generally been used widely and there are some keys that are written for public and the major discernment is to protect the data that is being transferred that is why it usually remains a secret or a issuance of confidentiality between the receiver and the sender. It is a matter of great concern for the government and especially the law enforcing agencies when the data is encrypted as they need to be better equipped with programs and software so as to be rejoinder the encrypted data and be able to read it. This is the sole reason that previously there was such a hue and cry with relations to the matter of privacy. It was discovered that there was no mail or communication that was hidden from them. They had super software and super computers to help them decode the algorithms and be able to decipher it. sooner in 2009 there a series of very serious attacks on various organizations like Yahoo, Google, Morgan Stanley, juniper Networks, Symantec, Dow Chemical and the Adobe Systems. It was an attempt to get hold and manipulate the SCM of these organizations. The SCMs were wide open for access and the organizations never thought of protecting them as they felt that it was safe. The SCMs are quite an important part of any programs as they help when the person is looking to restructure the programs or rewrite them for any changes that are required. The main reason for the attack was to modify the SCM and then re modify the programs to their own motives. This attack showed how vulnerable the SCMs were. The result of this attack was to encrypt the SCM so that even if anyone got hold of them they would not be able to modify it. The encryption systematize the programming and thus it was useless until the person was an expert in the algorithms. The attack basically modified the archive path and turned normal usable soft ware into malwares. It was at first discovered by the Google communicate and then as a result they put forward an ultimatum that this originated in china and if it is not interpreted care of Google would close its franchise in China. There were further algorithms that were released from time to time just to drive the loopholes that existed in various very commonly used software and this was done by random programmers. encryption helps prevent such attacks (Stallings, 2011). With the advent of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.