This document discusses data encryption techniques. It mentions the Caesar cipher which encrypts letters by shifting them a set number of positions in the alphabet. It also discusses encryption using a cipher algorithm to encrypt senders' data and requiring a decryption tool to read it. Finally, it mentions public/private key encryption which uses different keys for encryption and decryption.
A cipher is any method of encrypting text. Some ciphers work by simply realigning the alphabet (for example, A is represented by D, B is represented by E, C is represented by F etc.) this is called Caesar Cipher.For example, the phrase: “Caesar Cipher” would be portrayed like this.Advanced Ciphers use both a key and an algorithm. A block cipher is one that breaks a message up into blocks and combines each block with a key i.e. 64 bit data.A message longer than the block sizecan still be encrypted with a block cipher by breaking the message into blocks and encrypting each block individually.
Encryption is where data is converted into an algorithm (cipher) which cannot understood by outside personnel i.e. Hackers. This is usually represented on a web browser as a padlock.How secure transactions work:The sender sends their data is an encrypted packet to the receiverThe receiver then sends an open packet back for the sender to insert their password or cipher algorithm. This open packet can then be locked by the sender but not opened as they have no access to that algorithm.The receiver receives their own packet back with the original algorithm in which they can unlock to recieve the original data!this is to prevent hackers intercepting the transaction.
Key encryption is a cryptographic system that uses 2 keys.A public key can be known to everyone whereas a private key is known by only the recipient.Only Public keys are allowed to Encrypt data whereas Private Keys can only decrypt data.Public key systems are commonly used to send and receive data over the internet such as credentials at the public key system is highly safe and secure to online users.Private key systems need keys or algorithms which are as long as the sending data to ensure safe encryption.When sending and receiving data, both recipients have to know the public keys to allow them to encrypt and decrypt the data.
FirewallA firewall is like a protective brick wall around your computer system which you cannot bypass, unless there are open ports. They prevent data transfer from unknown sources which my contain malicious files.Different ports in the firewall are used to allow transfers for different areas of computing e.g. Port 80 is for HTTP transfers and port 21 is for TCP.A firewalls primary objective is to limit the exposure of a computer or computer network to attack from crackers; and is commonly used on local area networks that are connected to the internet. Anti-VirusViruses can have a huge impact on organisations. A virus could unknowingly be brought into an office building by a work colleague via a pen drive and be unleashed across the network within seconds. An anti virus software can combat that and prevent the virus from spreading. A anti virus software works by having definitions, like a dictionary of known viruses, the AV will scan the device and compare it with the definitions, if there is a match then the virus is quarantined. More modern sophisticated AV products can now also run disk clean ups, defrags and backups.BackupA backup could arguably be the most important thing in information systems. Organisations should backup regularly, at least once a week. This is so that if a network or system is compromised, it is safe to wipe the system clean, as there is a copy of how the system was before which can then be simply downloaded from a web source or storage media and installed.