Encryption is essential method

Assignment Help Other Subject
Reference no: EM132333772

Question: 1

Encryption Tools

Encryption is an essential method that helps in providing security to information for the purpose of protecting the data that is transmitted over internet networks. It is extensively used on the internet in order to secure the information of the user that is sent through a browser and a server (Tom, 2011). There are many tools that are used in encryption; these tools include email encryption tools, communication encryption tool, and network traffic encryption tool. These tools play an important in maintaining the security of the information of the user.

There are a good number of paid and free approaches that are used in the encryption of network traffic. There are to major things that are to be put into consideration when someone is encrypting traffic on the network, and you must also consider traffic encryption from outside the network. Communication encryption tools, they concerned with prompt messages or chats, and there is one thing that people have to put into consideration is their chats to their fellow peers. If their chats are not coded by the central company, this information can be accessed and read by other people. Another tool is the Email encryption tool; Open encrypting protocol is used by several clients in order to secure email communications that are being (Rob, 2007). An additional plugin is often required by many clients such plugin include the gp4o. Someone will be required to have a public key if someone is going to send to them a mail that has been encrypted.

The Microsoft encryption tools and other encryption tools that are not found in Microsoft are common similarities since both of them provide security. They help in the protection of information from unauthorized people. On the other hand, the business uses these tools to protect the secrets of the corporation (Michael, 2013). The Microsoft encryption tools differ from other tools that are used in encryption, for instance, EFS differs from Bitlocker since the in encrypts the entire message while the EFS it encrypts the files one after the other. Therefore the Microsoft encryption tools provide the highest level of security.

References

Michael, G. S., (2013). Security Strategies in Windows Platforms and Applications. New York: Jones & Bartlett Publishers.

Rob, T., (2007). Master VISUALLY Microsoft Windows Vista. London: John Wiley & Sons.

Sean-Philip, O., (2013). Hacker Techniques, Tools, and Incident Handling. New York: Jones & Bartlett Publishers.

Tom, C., (2011). Microsoft Windows Server Administration Essentials. New York: John Wiley & Sons.

Question: 2

Threat mitigation approaches are the acts which reduce the severity and the seriousness of the impact of the threats on the system or application. Threat mitigation is important to perform corrective actions and the prevention or the remedies which are put in place for combating and also reduce the IT threats on the computers, servers, and networks (Kirilmaz & Erol, 2017). Most businesses and applications are somewhat aware of the threat that is there on the Internet which can attack and compromise their systems.

It is indeed a good practice to customize the threat mitigation approach in such a way that those custom threats can be easily detected to have some comprehensive data security strategy to protect against those threats and also the employees and the users and customers from those threats. Thus, using custom threat mitigation approaches is a good thought and technique (Bommer, Crowley & Pinho, R. 2015).

The disadvantages of using custom threat mitigation approaches are you are concentrating on only a specific range of threats to occur while your other side is lightly guarded, that is threats which you do not recognize or know, can be rather harmful in this case. Thus using custom threat mitigation approaches is a disadvantage in this case.

Reference:

Kirilmaz, O., & Erol, S. (2017). A proactive approach to supply chain risk management: Shifting orders among suppliers to mitigate the supply-side risks. Journal of Purchasing and Supply Management, 23(1), 54-65.

Bommer, J. J., Crowley, H., & Pinho, R. (2015). A risk-mitigation approach to the management of induced seismicity. Journal of Seismology, 19(2), 623-646.

Reference no: EM132333772

Questions Cloud

Explain the concept of resilience in relation to transitions : O4-F/602/2853-Lead the Management of Transitions-Pearson Edexcel Level 5 Diplomas in Leadership for Health and Social Care and Children and Young People's.
Slightly overweight want nothing better then to lose : Often time's people who become slightly overweight want nothing better then to lose those extra pounds as quickly as they possibly can.
What are the common operating system problems : BN104 - Operating Systems - How do computer hardware, OS and application programs work together - What are the common operating system problems
Belly blast diet review : There are many things you 1 Hour Belly Blast Diet Review can do to get rid of your belly fat. Increasing your activity level, which includes exercise, sports,
Encryption is essential method : Encryption is an essential method that helps in providing security to information for purpose of protecting the data that is transmitted over internet networks
Subjective experience of pain : Subjective experience of pain is not just caused by our experience of the pain sensations that a migraine brings us but it is affected by our reaction to pain
Describe the school setting and environment : Describe the demographic section of your lesson plan. This piece is longer than a real classroom lesson plan, because your peers need to understand the setting.
Erase my back pain review : Females tend to be more Erase My Back Pain Review prone to sacroiliac joint pain than males. This may be due to the anatomical differences in the bone structure
Review problem - the flourishing of online learning : "The Flourishing of Online Learning" Please respond to the following: Describe how Internet technology to support instruction and learning has changed during.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd