Thursday, June 13, 2019

Computer Security Research Paper Example | Topics and Well Written Essays - 500 words

Computer Security - Research Paper ExampleMoreover, even if the vulnerabilities are exposed, it is believably that the hackers have used that information before. B.Keeping the attack confidential. This approach is being lauded by many organizations because this restricts the movements of hackers who are looking for exploits. This approach is good for government agencies because the general universe can react hysterically once they learn that public agencies are not that secure. Perhaps, this approach should be used by organizations and agencies that can compromise issue security. 2. The parallel type of encryption is more popularly used simply because it more convenient and faster to implement than asymmetric encryption. This is due to the fact that equivalent key is used to encrypt and decrypt the code by both receiver and sender of the message. There are many two main types of symmetric algorithms block and stream ciphers. Examples of symmetric key cryptography are DES, IDEA, AES and RC2. So far, DES is the most commonly used form of symmetric key. The only scrap presented to this method of encryption is that both parties must have a secure method when exchanging keys. Also, problems in verification can be encountered because both sender and user share the same key. Nevertheless, symmetric type is still used due to its speed and efficiency.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.