ISSC 361 American Military University Secret and Public Key Cryptography Paper

Instructions:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Details of Project Paper (15%):  You must include at least 3 references.Prepare a 10-15 page paper in Microsoft Word (counts as 15% of the final  grade) in APA format (see writing expectations in the Policies section)  (350 words per page).

1. At a minimum include the following:

  • Detailed description of the area researched
  • Technology involved in the area
  • Future trends in the area
  • Example companies involved in the area
  • Regulatory issues surrounding the area
  • Global implications for the area
  • 1
    Running head: Outline
    Outline
    Robert Ramos
    12/11/19
    2
    THESIS STATEMENT
    Outline
    Topic: Secret & Public Key Cryptography
    I.
    Introduction
    A. Data security is growing into a major global concern for both private and public
    organizations.
    B. Information is very vital in any organization, either private or public, and hence, its safety
    should be assured at all costs (Department of Homeland Security, 2006).
    C. The advancement of technology has made it possible to deal with many threats. At the
    same time progress has made it challenging to deal with threats towards information
    because cyber attackers perform their attacks from a remote location.
    D. The aim of this paper is to research on how public key cryptography be used to promote
    data security in organizations.
    E. To better address this issue, this paper will look at the technology involved in the area,
    future trends in the area, example companies involved in the area regulatory issues
    surrounding the area and global implications for the area
    Thesis: Secret & Public key Cryptography is a critical tool that organizations can use to help
    boost data security as well as restricting unauthorized users from accessing restricted
    information.
    II.
    Body
    A. Description and Technology
    1) Secret and public-key cryptography involves the use of public and private data to
    encrypt the messages. In this method, large numbers are used to encrypt and decrypt
    THESIS STATEMENT
    3
    the message. The public key is the one that is shared among a lot of people to use
    when they want to read a message while the secret key is the other key that are not
    shared.
    2) Users and systems should ensure that the secret and public keys are authentic to be
    able to access the message (Rouse, 2019).
    3) Secret and public-key cryptography is crucial in an organization where many people
    need to access the same information.
    4) Secret and public keys are used interchangeably; for instance, when one is used for
    encryption, the other one is used for decryption and visa vasa.
    B. Future trends in the area
    1) We encrypt data as it travels over the internet as well as when it is sitting in a
    device. When wanting to use the or analyze the data we need to decrypt it.
    Homomorphic encryption is a new idea that solves that problem, allowing users to
    process data without decrypting it. With homomorphic encryption, we process
    encrypted data and produce encrypted results (Gerber, S. 2018)
    2) Quantum cryptography is the only proven method to transmit a secret key or
    password over a long distance. This is done by photons of light that physically
    move a shared file between two users. They could be intercepted but the photons
    cannot be copied thus raising the security of them.
    3) More research is being done, and new strategies shall be used in the near future
    (Maughan, 2010).
    C. Example companies involved in the area
    THESIS STATEMENT
    4
    1) Corporate and financial; organizations are also using these measures to protect their
    information from unauthorized access because they contain crucial information.
    Furthermore, individuals can use these strategies on their daily bases because they are
    also facing the same threats.
    D. Regulatory issues surrounding the area
    1) Organizations using data security measures such as secret & public key cryptography
    are required to comply with data privacy regulations. Regulations such as General
    Data Protection Regulation (GDPR) require organizations to test their security
    measures regularly to check the weaknesses, strengths, and safety that they have.
    2) Complying with regulations ensures that the measures being applied meet the
    standard because different types of data are subjected to different regulations
    (Stanganeli, 2019).
    E. Global implications for the area
    1) The issue of data security is not a one-state issue but a global problem.
    2) Cybercrime is a global issue due to the fact that cyber attackers can perform their
    crimes from remote locating.
    3) It requires global intervention to ensure data protection.
    III.
    Conclusion
    A. Th issue of information security has become a major concern among many countries in
    the world.
    B. As new technology and research are being conducted to address data security such as
    cybercrime. Simple techniques such as authentication, authorization, and encryption
    should be used to protect data.
    THESIS STATEMENT
    5
    C. Ensuring that data security is becoming too complex. There is a need for more research to
    develop a lasting solution.
    6
    THESIS STATEMENT
    Reference
    Department of Homeland Security. (2006). Cyber storm exercise report. National Cyber Security
    Division.
    Maughan, D. (2010). The need for a national cybersecurity research and development agenda:
    Communications of the ACM. ACM Digital Library, 29-31.
    Rouse, M. (2019). Assymetric Cryptography (Public Key Cryptography). Search Security.
    Stanganeli, J. (2019, November 20). Compliance and Data Privacy Regs IT Security Pros Should
    Worry About. Security Planet.
    Gerber, S. (2018, April 27). 12 big encryption trends that will keep data more secure.

    Save Time On Research and Writing
    Hire a Pro to Write You a 100% Plagiarism-Free Paper.
    Get My Paper
    Still stressed from student homework?
    Get quality assistance from academic writers!

    Order your essay today and save 25% with the discount code LAVENDER