Monday, January 29, 2018

"Week 8 Blog Posting"



In this week reading in chapter 8 on Security, it had a lot of good information ranging from access controls, types of permissions and encryption. I thought the encryption section was very useful information with good detail in the various types of categories like Symmetric-key encryption and Asymmetric-key encryption. These computer systems are used with computers or devices either in the home or business sector in order to keep data encrypted with use of one or multiple keys. When these encryptions are used there are several ways to protect your data from being compromised on the network, one of these options is the use of Disk Encryption. This technology is used to convert your data into a code that is unreadable, and that only authorized by an administrator that has the permissions to decipher and read it. Another type of encryption that is used is File Encryption. This technology is also used by companies to safeguard their information with the use of a filing system. It works similar to disk encryption, but it does it by encrypting files individually.

No comments:

Post a Comment