SlideShare a Scribd company logo
1 of 4
Encryption Methodologies to Protect an Organization’s Data
Paper
Encryption Methodologies to Protect an Organization’s Data
Paper 8Encryption Methodologies to Protect an
Organization’s Data Paper
David Dorsaima
CMGT/431
December 1, 2019
Steven Powelson
Encryption Policy for an Organization
The security of an organization is one of the key factors that
determines success. In a world where technological advances
have been made in all sectors, there is a need to ensure that
robust measures are put in place to manage the prevailing
situation. Lights on Dance (LOD) must also be able to initiate
an encryption policy that would prevent loss of the critical data
that has become a common scene in most organizations. We
must keep in mind, zero loss is rare, but still is LOD goal.
Hackers and malicious individuals have often taken advantage
of any loopholes within an organization`s structure to steal and
destroy any critical data for the organization. Therefore, such
loopholes must be effectively managed by putting into place
policies that would prevent the loss of such crucial data
(Basmov et al. 2016).
LOD has a plethora of sensitive data that must be taken care of
and monitored to ensure that this data isn’t lost or
compromised. Examples:
· User/Customer information: Crucial data for LOD’s long term
success. The sensitive data might comprise of names of the
clients/Users, email, addresses, payment information,
application attributes and/or social security numbers.
· Employee data: Similar to Customer/User data, our database
may comprise of employee's address, email, payment/payroll
details, social security numbers and data associated with
credential processing.
· Proprietary Data: (Intellectual property and trade secrets) All
companies have secrets behind success that they rely on when
making critical decisions.
· Operational information: All the details in the inventory books
are usually sensitive company data that should not be disclosed
to the public.
Therefore LOD’s encryption policy shall be in place to ensure
crucial data points are effectively managed to prevent data loss.
Asymmetric and Symmetric Encryption Methodologies
The security of sensitive data is a matter of priority, that must
be fully taken care of to ensure intrusion doesn’t take place.
The best encryption method must be used to protect the data
within the network. Therefore, in this case, we highlight some
of the best available encryption keys that can always be used to
protect our data. Asymmetric encryption method: Usage of both
private and public keys to encrypt and decrypt messages. The
sender and receiver must have the decryption keys to access the
data. This is commonly used by the PKI in which the user's
information is kept away from unwanted hands, thus preventing
threats and damage posed by intruders (Budish, Burkert &
Gasser, 2018).
On the other, there is an asymmetric encryption method in
which there is a single key that has to be shared among all
users. In this case, the users must have this key to be able to
access these sensitive data. In this case, there are TLS and SSL
which are cryptographic protocols designed to provide
communication security whenever used. They provide instant
communication through messaging, emailing, web browsing and
voice over IP. Therefore, LOD shall be able to incorporate these
protocols, which would ensure mitigation of data loss.
Common Security Threats
There are various ways in which LOD might be exposed to
threats and potential data loss. For instance, the issue of social
engineering and phishing in which the employees might
unknowingly or knowingly give access to critical data to
unwanted persons. This is usually determined when the damage
has already been done. It can be prevented by training
employees on such issues (Byrne, 2018).
In addition, preventing poor password practices, while also
discouraging entry/access from unwanted person, is a great step
in the right direction. In most cases, employees often use
passwords commonly used and known in the public domain,
thus making it easier for an intruder to take note of such
loopholes and attack from there.
Implementation of Encryption Methods
Protection of LOD’s sensitive data can only be done by
implementing the use of an encryption method. Therefore, there
should be the use of PKI, SSL, and TLS to ensure that all
sectors of the company are well secured. This means that there
must be the use of both primary and public keys for anyone that
seeks to access data from the organization by the use of PKI. On
the other hand, one must have a primary key to access data
when using both TLS and SSL which are highly reliable and
efficient when used.
References
Basmov, I., Nyström, M. B. G., Semenko, A. M., MacIver, D.
M., & Li, D. (2016). U.S. Patent No. 9,477,614. Washington,
DC: U.S. Patent and Trademark Office.
Budish, R. H., Burkert, H., & Gasser, U. (2018). Encryption
Policy and its International Impacts: A Framework for
Understanding Extraterritorial Ripple Effects.
Byrne, S. (2018). U.S. Patent No. 10,104,044. Washington, DC:
U.S. Patent and Trademark Office.

More Related Content

Similar to Encryption Methodologies to Protect an Organization’s Data Paper.docx

Introduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docxIntroduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docx
normanibarber20063
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
annaielectronicsvill
 
Data_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdfData_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdf
Mehdi Ahmadi
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
Safeguardsintheworkplace
Adam Richards
 

Similar to Encryption Methodologies to Protect an Organization’s Data Paper.docx (20)

Introduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docxIntroduction Over the past years, there have been increasing ca.docx
Introduction Over the past years, there have been increasing ca.docx
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
Is Encryption the Only Key to GDPR?
Is Encryption the Only Key to GDPR?Is Encryption the Only Key to GDPR?
Is Encryption the Only Key to GDPR?
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Data_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdfData_Security_Guide_Everything_You_Need_to_Know.pdf
Data_Security_Guide_Everything_You_Need_to_Know.pdf
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
Safeguardsintheworkplace
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 

More from gidmanmary

Using Earned Value to Determine StatusJennifer turned in her statu.docx
Using Earned Value to Determine StatusJennifer turned in her statu.docxUsing Earned Value to Determine StatusJennifer turned in her statu.docx
Using Earned Value to Determine StatusJennifer turned in her statu.docx
gidmanmary
 
Using APA style format, write a 4-5 page paper describing the provis.docx
Using APA style format, write a 4-5 page paper describing the provis.docxUsing APA style format, write a 4-5 page paper describing the provis.docx
Using APA style format, write a 4-5 page paper describing the provis.docx
gidmanmary
 
Use the percentage method to compute the federal income taxes to w.docx
Use the percentage method to compute the federal income taxes to w.docxUse the percentage method to compute the federal income taxes to w.docx
Use the percentage method to compute the federal income taxes to w.docx
gidmanmary
 
Use the textbook andor online sources to locate and capture three w.docx
Use the textbook andor online sources to locate and capture three w.docxUse the textbook andor online sources to locate and capture three w.docx
Use the textbook andor online sources to locate and capture three w.docx
gidmanmary
 
use the work sheet format made available  but only to give brief, bu.docx
use the work sheet format made available  but only to give brief, bu.docxuse the work sheet format made available  but only to give brief, bu.docx
use the work sheet format made available  but only to give brief, bu.docx
gidmanmary
 
Use the link provided to complete a self-assessment. After completin.docx
Use the link provided to complete a self-assessment. After completin.docxUse the link provided to complete a self-assessment. After completin.docx
Use the link provided to complete a self-assessment. After completin.docx
gidmanmary
 
Use the SPSS software and the data set (2004)GSS.SAV (attached).docx
Use the SPSS software and the data set (2004)GSS.SAV (attached).docxUse the SPSS software and the data set (2004)GSS.SAV (attached).docx
Use the SPSS software and the data set (2004)GSS.SAV (attached).docx
gidmanmary
 

More from gidmanmary (20)

Using C#, write a program to find the nearest common parent of any t.docx
Using C#, write a program to find the nearest common parent of any t.docxUsing C#, write a program to find the nearest common parent of any t.docx
Using C#, write a program to find the nearest common parent of any t.docx
 
Using autoethnography in a qualitative research,consider a resid.docx
Using autoethnography in a qualitative research,consider a resid.docxUsing autoethnography in a qualitative research,consider a resid.docx
Using autoethnography in a qualitative research,consider a resid.docx
 
Using Earned Value to Determine StatusJennifer turned in her statu.docx
Using Earned Value to Determine StatusJennifer turned in her statu.docxUsing Earned Value to Determine StatusJennifer turned in her statu.docx
Using Earned Value to Determine StatusJennifer turned in her statu.docx
 
Using at least your textbook and a minimum of three additional sourc.docx
Using at least your textbook and a minimum of three additional sourc.docxUsing at least your textbook and a minimum of three additional sourc.docx
Using at least your textbook and a minimum of three additional sourc.docx
 
Using APA style format, write a 4-5 page paper describing the provis.docx
Using APA style format, write a 4-5 page paper describing the provis.docxUsing APA style format, write a 4-5 page paper describing the provis.docx
Using APA style format, write a 4-5 page paper describing the provis.docx
 
Use the organization you selected in Week One and the Security Ass.docx
Use the organization you selected in Week One and the Security Ass.docxUse the organization you selected in Week One and the Security Ass.docx
Use the organization you selected in Week One and the Security Ass.docx
 
Using DuPont analysis is a quick and relatively easy way to assess t.docx
Using DuPont analysis is a quick and relatively easy way to assess t.docxUsing DuPont analysis is a quick and relatively easy way to assess t.docx
Using DuPont analysis is a quick and relatively easy way to assess t.docx
 
Using APA style, prepare written research paper of 4 double spaced p.docx
Using APA style, prepare written research paper of 4 double spaced p.docxUsing APA style, prepare written research paper of 4 double spaced p.docx
Using APA style, prepare written research paper of 4 double spaced p.docx
 
Use the organization selected for your Managing Change Paper Part .docx
Use the organization selected for your Managing Change Paper Part .docxUse the organization selected for your Managing Change Paper Part .docx
Use the organization selected for your Managing Change Paper Part .docx
 
Use your knowledge to develop the circumstances and details involved.docx
Use your knowledge to develop the circumstances and details involved.docxUse your knowledge to develop the circumstances and details involved.docx
Use your knowledge to develop the circumstances and details involved.docx
 
Use the percentage method to compute the federal income taxes to w.docx
Use the percentage method to compute the federal income taxes to w.docxUse the percentage method to compute the federal income taxes to w.docx
Use the percentage method to compute the federal income taxes to w.docx
 
Use the textbook andor online sources to locate and capture three w.docx
Use the textbook andor online sources to locate and capture three w.docxUse the textbook andor online sources to locate and capture three w.docx
Use the textbook andor online sources to locate and capture three w.docx
 
Use the Web to conduct research on User Domain Security Policy and A.docx
Use the Web to conduct research on User Domain Security Policy and A.docxUse the Web to conduct research on User Domain Security Policy and A.docx
Use the Web to conduct research on User Domain Security Policy and A.docx
 
Use this Article to create the powerpoint slidesBrown, S. L., No.docx
Use this Article to create the powerpoint slidesBrown, S. L., No.docxUse this Article to create the powerpoint slidesBrown, S. L., No.docx
Use this Article to create the powerpoint slidesBrown, S. L., No.docx
 
use the work sheet format made available  but only to give brief, bu.docx
use the work sheet format made available  but only to give brief, bu.docxuse the work sheet format made available  but only to give brief, bu.docx
use the work sheet format made available  but only to give brief, bu.docx
 
Use these three sources to compose an annotated bibliography on Data.docx
Use these three sources to compose an annotated bibliography on Data.docxUse these three sources to compose an annotated bibliography on Data.docx
Use these three sources to compose an annotated bibliography on Data.docx
 
Use this outline to crete a four page essay. Guideline included and .docx
Use this outline to crete a four page essay. Guideline included and .docxUse this outline to crete a four page essay. Guideline included and .docx
Use this outline to crete a four page essay. Guideline included and .docx
 
Use the link provided to complete a self-assessment. After completin.docx
Use the link provided to complete a self-assessment. After completin.docxUse the link provided to complete a self-assessment. After completin.docx
Use the link provided to complete a self-assessment. After completin.docx
 
Use the SPSS software and the data set (2004)GSS.SAV (attached).docx
Use the SPSS software and the data set (2004)GSS.SAV (attached).docxUse the SPSS software and the data set (2004)GSS.SAV (attached).docx
Use the SPSS software and the data set (2004)GSS.SAV (attached).docx
 
Use the Internet to research functional systems that would contain a.docx
Use the Internet to research functional systems that would contain a.docxUse the Internet to research functional systems that would contain a.docx
Use the Internet to research functional systems that would contain a.docx
 

Recently uploaded

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
Krashi Coaching
 

Recently uploaded (20)

Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING IIII BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
II BIOSENSOR PRINCIPLE APPLICATIONS AND WORKING II
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf....................Muslim-Law notes.pdf
....................Muslim-Law notes.pdf
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
Mattingly "AI and Prompt Design: LLMs with Text Classification and Open Source"
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17How to Analyse Profit of a Sales Order in Odoo 17
How to Analyse Profit of a Sales Order in Odoo 17
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
MSc Ag Genetics & Plant Breeding: Insights from Previous Year JNKVV Entrance ...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 

Encryption Methodologies to Protect an Organization’s Data Paper.docx

  • 1. Encryption Methodologies to Protect an Organization’s Data Paper Encryption Methodologies to Protect an Organization’s Data Paper 8Encryption Methodologies to Protect an Organization’s Data Paper David Dorsaima CMGT/431 December 1, 2019 Steven Powelson Encryption Policy for an Organization The security of an organization is one of the key factors that determines success. In a world where technological advances have been made in all sectors, there is a need to ensure that robust measures are put in place to manage the prevailing situation. Lights on Dance (LOD) must also be able to initiate an encryption policy that would prevent loss of the critical data that has become a common scene in most organizations. We must keep in mind, zero loss is rare, but still is LOD goal. Hackers and malicious individuals have often taken advantage of any loopholes within an organization`s structure to steal and
  • 2. destroy any critical data for the organization. Therefore, such loopholes must be effectively managed by putting into place policies that would prevent the loss of such crucial data (Basmov et al. 2016). LOD has a plethora of sensitive data that must be taken care of and monitored to ensure that this data isn’t lost or compromised. Examples: · User/Customer information: Crucial data for LOD’s long term success. The sensitive data might comprise of names of the clients/Users, email, addresses, payment information, application attributes and/or social security numbers. · Employee data: Similar to Customer/User data, our database may comprise of employee's address, email, payment/payroll details, social security numbers and data associated with credential processing. · Proprietary Data: (Intellectual property and trade secrets) All companies have secrets behind success that they rely on when making critical decisions. · Operational information: All the details in the inventory books are usually sensitive company data that should not be disclosed to the public. Therefore LOD’s encryption policy shall be in place to ensure crucial data points are effectively managed to prevent data loss. Asymmetric and Symmetric Encryption Methodologies The security of sensitive data is a matter of priority, that must be fully taken care of to ensure intrusion doesn’t take place. The best encryption method must be used to protect the data within the network. Therefore, in this case, we highlight some of the best available encryption keys that can always be used to protect our data. Asymmetric encryption method: Usage of both private and public keys to encrypt and decrypt messages. The sender and receiver must have the decryption keys to access the data. This is commonly used by the PKI in which the user's information is kept away from unwanted hands, thus preventing threats and damage posed by intruders (Budish, Burkert & Gasser, 2018).
  • 3. On the other, there is an asymmetric encryption method in which there is a single key that has to be shared among all users. In this case, the users must have this key to be able to access these sensitive data. In this case, there are TLS and SSL which are cryptographic protocols designed to provide communication security whenever used. They provide instant communication through messaging, emailing, web browsing and voice over IP. Therefore, LOD shall be able to incorporate these protocols, which would ensure mitigation of data loss. Common Security Threats There are various ways in which LOD might be exposed to threats and potential data loss. For instance, the issue of social engineering and phishing in which the employees might unknowingly or knowingly give access to critical data to unwanted persons. This is usually determined when the damage has already been done. It can be prevented by training employees on such issues (Byrne, 2018). In addition, preventing poor password practices, while also discouraging entry/access from unwanted person, is a great step in the right direction. In most cases, employees often use passwords commonly used and known in the public domain, thus making it easier for an intruder to take note of such loopholes and attack from there. Implementation of Encryption Methods Protection of LOD’s sensitive data can only be done by implementing the use of an encryption method. Therefore, there should be the use of PKI, SSL, and TLS to ensure that all sectors of the company are well secured. This means that there must be the use of both primary and public keys for anyone that seeks to access data from the organization by the use of PKI. On the other hand, one must have a primary key to access data when using both TLS and SSL which are highly reliable and efficient when used.
  • 4. References Basmov, I., Nyström, M. B. G., Semenko, A. M., MacIver, D. M., & Li, D. (2016). U.S. Patent No. 9,477,614. Washington, DC: U.S. Patent and Trademark Office. Budish, R. H., Burkert, H., & Gasser, U. (2018). Encryption Policy and its International Impacts: A Framework for Understanding Extraterritorial Ripple Effects. Byrne, S. (2018). U.S. Patent No. 10,104,044. Washington, DC: U.S. Patent and Trademark Office.