Encryption Methodologies to Protect an Organization’s Data Paper Encryption Methodologies to Protect an Organization’s Data Paper 8Encryption Methodologies to Protect an Organization’s Data Paper David Dorsaima CMGT/431 December 1, 2019 Steven Powelson Encryption Policy for an Organization The security of an organization is one of the key factors that determines success. In a world where technological advances have been made in all sectors, there is a need to ensure that robust measures are put in place to manage the prevailing situation. Lights on Dance (LOD) must also be able to initiate an encryption policy that would prevent loss of the critical data that has become a common scene in most organizations. We must keep in mind, zero loss is rare, but still is LOD goal. Hackers and malicious individuals have often taken advantage of any loopholes within an organization`s structure to steal and destroy any critical data for the organization. Therefore, such loopholes must be effectively managed by putting into place policies that would prevent the loss of such crucial data (Basmov et al. 2016). LOD has a plethora of sensitive data that must be taken care of and monitored to ensure that this data isn’t lost or compromised. Examples: · User/Customer information: Crucial data for LOD’s long term success. The sensitive data might comprise of names of the clients/Users, email, addresses, payment information, application attributes and/or social security numbers. · Employee data: Similar to Customer/User data, our database may comprise of employee's address, email, payment/payroll details, social security numbers and data associated with credential processing. · Proprietary Data: (Intellectual property and trade secrets) All companies have secrets behind success that they rely on when making critical decisions. · Operational information: All the details in the inventory books are usually sensitive company data that should not be disclosed to the public. Therefore LOD’s encryption policy shall be in place to ensure crucial data points are effectively managed to prevent data loss. Asymmetric and Symmetric Encryption Methodologies The security of sensitive data is a matter of priority, that must be fully taken care of to ensure intrusion doesn’t take place. The best encryption method must be used to protect the data within the network. Therefore, in this case, we highlight some of the best available encryption keys that can always be used to protect our data. Asymmetric encryption method: Usage of both private and public keys to encrypt and decrypt messages. The sender and receiver must have the decryption keys to access the data. This is commonly used by the PKI in which the user's information is kept away from unwanted hands, thus preventing threats and damage posed by intruders (Budish, Burkert & Gasser, 2018). On the other, there is an asymmetric encryption method in which there is a single key that has to be shared among all us ...