Discuss how organizations use a wide variety of encryption technologies for vari
ID: 3734734 • Letter: D
Question
Discuss how organizations use a wide variety of encryption technologies for various purposes and analyze uses of encryption and hashing for information security among these various types of organizations: government, military, health care, academic, business, and financial. Emphasize the importance of factors in identifying strong and weak cryptosystems, as well as the differing needs of organizations based on their security needs.
Why is it important to understand the risks weak physical security presents? How about Logical security?
Explanation / Answer
In many big organisations and companies are using various security methods in order to secure their business data and business information.
There many technologies comes under the security part itself like encryption technologies. which can be very beneficial to all areas and organisations like government, military, health care, academic, business, and financial sectors.
By using the encryption technologies we can encrypt the important data in the business. Like we can store all important information like user details, employee details and their passwords in a encrypted way. So that nobody can see or hack the encrypted data. If he can he cannot crack the encrpted data.
In this way many companies and organisations using the encryption technologies to secure there data and also secure the business.
There are many advantages by using the encryption technologies those are:
- By using the encryption technologies we can secure business data and also we can Provide Security for Data at All times.
- By using the encryption technologies we can Maintain the data Integrity.
- By using the encryption technologies we can do all the protections of data and we can also do Encryption for privacy Protection.
- By using the encryption technologies is also a Part of Compliance.
- By using the encryption technologies we can also Protects Data across Devices.
The risks weak physical security presented now a days are :
The Unclassified Data which is very confidential and it has all the integrity requirements so that must always secure it.
The Restricted Data must be srecorded and secure with help pf better security techenics.
The Confidential Data must be protected and we must keep certain security levels in order to protect it.
We must maintain all the physical security integrity levels to secure the data.
Even by using the Logical security we can protect our data like by using many technologies in logical way like:
- user account management.
In the user account managemen we can provide access control to a user and we can also give certain steps to and make it work.
In the logical security it is very much necessary to create a user account with a login and password to keep the business data secure.
There are many Special features available in logical security area like providing and keeping firewalls for the internet security.
Setuping the network and domain and keep network security for secure the data in the network.
Providing Access Control and Auditing in all areas and organisations
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.