Instructions:
Details of Project Paper (15%): You must include at least 3 references.Prepare a 10-15 page paper in Microsoft Word (counts as 15% of the final grade) in APA format (see writing expectations in the Policies section) (350 words per page).
1. At a minimum include the following:
1
Running head: Outline
Outline
Robert Ramos
12/11/19
2
THESIS STATEMENT
Outline
Topic: Secret & Public Key Cryptography
I.
Introduction
A. Data security is growing into a major global concern for both private and public
organizations.
B. Information is very vital in any organization, either private or public, and hence, its safety
should be assured at all costs (Department of Homeland Security, 2006).
C. The advancement of technology has made it possible to deal with many threats. At the
same time progress has made it challenging to deal with threats towards information
because cyber attackers perform their attacks from a remote location.
D. The aim of this paper is to research on how public key cryptography be used to promote
data security in organizations.
E. To better address this issue, this paper will look at the technology involved in the area,
future trends in the area, example companies involved in the area regulatory issues
surrounding the area and global implications for the area
Thesis: Secret & Public key Cryptography is a critical tool that organizations can use to help
boost data security as well as restricting unauthorized users from accessing restricted
information.
II.
Body
A. Description and Technology
1) Secret and public-key cryptography involves the use of public and private data to
encrypt the messages. In this method, large numbers are used to encrypt and decrypt
THESIS STATEMENT
3
the message. The public key is the one that is shared among a lot of people to use
when they want to read a message while the secret key is the other key that are not
shared.
2) Users and systems should ensure that the secret and public keys are authentic to be
able to access the message (Rouse, 2019).
3) Secret and public-key cryptography is crucial in an organization where many people
need to access the same information.
4) Secret and public keys are used interchangeably; for instance, when one is used for
encryption, the other one is used for decryption and visa vasa.
B. Future trends in the area
1) We encrypt data as it travels over the internet as well as when it is sitting in a
device. When wanting to use the or analyze the data we need to decrypt it.
Homomorphic encryption is a new idea that solves that problem, allowing users to
process data without decrypting it. With homomorphic encryption, we process
encrypted data and produce encrypted results (Gerber, S. 2018)
2) Quantum cryptography is the only proven method to transmit a secret key or
password over a long distance. This is done by photons of light that physically
move a shared file between two users. They could be intercepted but the photons
cannot be copied thus raising the security of them.
3) More research is being done, and new strategies shall be used in the near future
(Maughan, 2010).
C. Example companies involved in the area
THESIS STATEMENT
4
1) Corporate and financial; organizations are also using these measures to protect their
information from unauthorized access because they contain crucial information.
Furthermore, individuals can use these strategies on their daily bases because they are
also facing the same threats.
D. Regulatory issues surrounding the area
1) Organizations using data security measures such as secret & public key cryptography
are required to comply with data privacy regulations. Regulations such as General
Data Protection Regulation (GDPR) require organizations to test their security
measures regularly to check the weaknesses, strengths, and safety that they have.
2) Complying with regulations ensures that the measures being applied meet the
standard because different types of data are subjected to different regulations
(Stanganeli, 2019).
E. Global implications for the area
1) The issue of data security is not a one-state issue but a global problem.
2) Cybercrime is a global issue due to the fact that cyber attackers can perform their
crimes from remote locating.
3) It requires global intervention to ensure data protection.
III.
Conclusion
A. Th issue of information security has become a major concern among many countries in
the world.
B. As new technology and research are being conducted to address data security such as
cybercrime. Simple techniques such as authentication, authorization, and encryption
should be used to protect data.
THESIS STATEMENT
5
C. Ensuring that data security is becoming too complex. There is a need for more research to
develop a lasting solution.
6
THESIS STATEMENT
Reference
Department of Homeland Security. (2006). Cyber storm exercise report. National Cyber Security
Division.
Maughan, D. (2010). The need for a national cybersecurity research and development agenda:
Communications of the ACM. ACM Digital Library, 29-31.
Rouse, M. (2019). Assymetric Cryptography (Public Key Cryptography). Search Security.
Stanganeli, J. (2019, November 20). Compliance and Data Privacy Regs IT Security Pros Should
Worry About. Security Planet.
Gerber, S. (2018, April 27). 12 big encryption trends that will keep data more secure.