Posted: September 4th, 2023
Large Scale Network Encryption
Computer Sciences and Information Technology
Topic:
Large Scale Network Encryption
Question 1: Identify and briefly explain at least three basic strategies that an organization might employ for managing keys in a cryptonet.
Question 2: Briefly explain the modern SSL handshake protocol, which establishes the shared secret and the keys to be used to protect SSL traffic. In what day-to-day application(s) is this protocol normally used?
Large Scale Network Encryption
The three basic strategies that an organisation might employ in managing keys in a crypto net includes choosing correctly what to encrypt, use of the personal code for basic of the organisation and check the levels of data encryption.
Check the levels of data encryption
The levels of data encryption are well selected from a number of areas which includes the database field, files and a number of applications which are identified separately. The information in the levels is protected by unique security codes. The protection risks of access in situations not expected (Parmar et al, 2017).
Use of the personal code for basics of the organisation
Mathematical algorithms can also be used to encrypt messages. For instance, the use of security codes should be changed regularly to minimize the chances of access by unauthorised individuals.
Choosing correctly what to encrypt
This involves considering a number of data sets and strengthening efficiency and effectiveness in an organisation. Strong encryption mechanisms should be adopted such as the use of full disk encryption for endpoint protection and pre-boot authentication, incorporating hardware security modules among other security measures.
Secure Socket Layer (SSL) is a type of cryptographic protocol that is capable of providing the security to communication in a network that is connected to computers. The connection is considered private in this protocol because of the nature of cryptography that is used in encrypting the transmitted messages over the network. It uses the systematic approach. On the other hand, it makes the use of hypertext transfer protocol (HTTP) to provide security to communication (Frahim et al, 2014). The protocol provided is an independent protocol. The protocol is used in day to day in securing communication over a network. The protocol can be used in different application layers.
References
Frahim, J., Santos, O., & Ossipov, A. (2014). Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services. Cisco Press.
Parmar, R. R., Roy, S., Bhattacharyya, D., Bandyopadhyay, S. K., & Kim, T. H. (2017). Large-scale encryption in the Hadoop environment: Challenges and solutions. IEEE Access, 5, 7156-7163.
Order | Check Discount
Sample Homework Assignments & Research Topics
Tags:
#1 Assignment Help Online Service for Students in the USA,
AI Plagiarism free essay writing tool,
Australian best tutors,
Can Someone Write My Assignment for Me,
Do my essay assignment