Sunday, April 28, 2019

Computer Security Research Paper Example | Topics and Well Written Essays - 500 words

Computer Security - Research Paper ExampleMoreover, even if the vulnerabilities are exposed, it is likely that the hackers live with apply that information before. B.Keeping the attack confidential. This advance is being lauded by many organizations because this restricts the movements of hackers who are looking for exploits. This approach is good for government agencies because the general in the public eye(predicate) can react hysterically once they learn that public agencies are not that secure. Perhaps, this approach should be used by organizations and agencies that can compromise national security. 2. The parallel type of encryption is more popularly used simply because it more convenient and faster to give than asymmetric encryption. This is due to the fact that same key is used to encrypt and decrypt the code by both receiver and sender of the message. There are many two main types of symmetric algorithms barricado and stream ciphers. Examples of symmetric key cryptogr aphy are DES, IDEA, AES and RC2. So far, DES is the most commonly used form of symmetric key. The only challenge presented to this method of encryption is that both parties must have a secure method when exchanging keys. Also, problems in verification can be encountered because both sender and user manage the same key. Nevertheless, symmetric type is still used due to its speed and efficiency.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.