Is using an encryption system like PGP a good idea

Is using an encryption system like PGP a good idea for individuals and organizations? And why?

The primary theme of the paper is Is using an encryption system like PGP a good idea for individuals and organizations? And why? in which you are required to emphasize its aspects in detail. The cost of the paper starts from $99 and it has been purchased and rated 4.9 points on the scale of 5 points by the students. To gain deeper insights into the paper and achieve fresh information, kindly contact our support.

Technology of Information Security

INSTRUCTIONS:

Case Assignment

Please prepare a 3- to 5-page paper addressing the question:



Is using an encryption system like PGP a good idea for individuals and organizations? And why?



Assignment Overview

To assure a trusted and resilient information and communications infrastructure, it is essential to secure the computer networks. Computer networks are implemented via technology. Part of solutions of their security in essence need to be via technology as well. The following two presentations provide the security protocols common in computer networks.



Kizza. Computer Network Security Protocols and Standards. Presentation.



Perlman, R. (2004), Network Security Protocols: A Tutorial. Presentation.



As you see from the presentations, to understand computer network security protocols, it is important to understand what cryptography is, as it is the building block of security protocols. The following reading provides a thorough review:



Kessler, G. (2011). An overview of cryptography. Retrieved from http://www.garykessler.net/library/crypto.html



If one is new to cryptograph, it takes some time for one to understand it. Maybe some hands-on practice will be helpful. You don`t have to get it all figured out, but give it a try. You may find it interesting.



There`s a program out there called Pretty Good Privacy (PGP), that provides personal encryption capabilities essentially equal to those available to almost all governments and capable of ensuring information privacy against almost if not absolutely all attacks. It has a long and interestingly checkered history, including having been at one time an illegal munition of war. Originating as freeware, it now exists in both free and commercial incarnations.



You`ll also want to look at the discussion and links to some versions of the program on Phil Zimmermann`s website (http://philzimmermann.com/EN/findpgp/) and at the GNU Privacy Guard website (http://www.gnupg.org/), which provides a free implementation on the Open Source model.



Now you have been exposed to technical solutions to security. Please also understand the challenges afflicated with technical solutions. The following article pinpoints the forever challenge to technology:



Schneier, B. (2012), How Changing Technology Affects Security. IEEE Security & Privacy. March/April 2012.



When you`ve had a chance to review these materials, do any other research on the topic that you find helpful, and think about the issues involved.



Case Assignment

Please prepare a 3- to 5-page paper addressing the question:



Is using an encryption system like PGP a good idea for individuals and organizations? And why?

CONTENT:

IT Security Technologies Name: Institution: Course: Date: IT Security Technologies Technology plays a subtle part in individuals’ lives and organizations alike (Schneier, 2012). People and organizations are both able to share and store important information that is sensitive, which they can access from anywhere in the world and using different platforms that exist (Perlman, 2004). With the rise of technology, hackers and malicious persons have also been on the rampage using the internet to make personal, political, social and economic scores. Issues such as identity theft and corporate/industrial/economic espionage (Gnupg.org, 2015).Cryptography has become one crucial science in the IT sector, for the individuals and organizations. Cryptography dates back to the 1900 B.C. and can be traced to Egypt, where an Egyptian had used hieroglyphs which were not st

...
100% Plagiarism Free & Custom Written, Tailored to your instructions