Preview

Explain the Way That Data Transmitted over a Network Can Be Protected by Encryption.

Good Essays
Open Document
Open Document
607 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Explain the Way That Data Transmitted over a Network Can Be Protected by Encryption.
M2 - Explain the way that data transmitted over a network can be protected by encryption.

Below, I will explain the way that data transmitted over a network can be encrypted to provide protection. I will explain what encryption entails, how data is transmitted, and why it is important to encrypt private data to ensure its protection.
What Does Encryption Entail and How Does It Work?
Encryption entails rearranging data in such a way that only the owner of both the encryption and decryption key can understand. It serves the purpose of passing information over networks in a “secret” form so that it cannot be interrupted by hackers who may wish to view the communications for malicious reasons. Encryption is extremely important for e-commerce as it allows confidential information such as credit and debit card details to be sent safely to the online business which is receiving these details. Web browsers are able to encrypt purchase details using an encryption method known as SSL (Secure Socket Layer). SSL is switched on when a user visits a secure server site which begins with HTTPS (Secure HyperText Protocol).
Encryption works by scrambling the original message with a very large digital number (key). This is done using advanced mathematics. Commercial level encryption uses 128-bit key that is very difficult to crack, even whilst using advanced software. The computer receiving the message understands and recognises the digital key; therefore, it is able to comprehend the intended message.
There are three major drawbacks to encryption: 1. It is slower than normal browsing. It can sometimes take quite a while for the browser to carry out the required maths to encrypt the message, and another delay on the receiving server may follow as it decrypts the data. 2. Online shops need to have a digital certificate that contains part of the required key. This is not free as must be supplied to them by a “certificate authority”. 3. Running a secure server can

You May Also Find These Documents Helpful

  • Powerful Essays

    Encryption prevents somebody using eavesdropping technology, such as a(n) ____, from capturing packets and using data in the packets for malicious purposes.…

    • 817 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab 8 Questions

    • 306 Words
    • 1 Page

    2. To prevent outsiders from exploiting connected resources and sniffing data that is being transmitted. The best encryption method is WPA2.…

    • 306 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. By implementing the encryption between workstations and WAP you can protect the confidentiality of data transmissions.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    A- Windows Server 2003, Standard Edition; Windows Server 2003, Enterprise Edition; and Windows Server 2003, Datacenter Edition, store a certificate locally on the computer or device that requested it or, in the case of a user, on the computer or device that the user used to request it. The storage location is called the certificate store. A certificate store will often have numerous certificates, possibly issued from a number of different certification authorities.…

    • 943 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    In order to operate a successful and efficient E-Business, organizations must avoid legal problems by always operating by policies and procedures established by the company and the intellectual property laws and rights. Security is crucial on an online business to protect customer’s personal and financial information. In order to perform safely and responsibly, organization must keep operating systems updated, limit access of sensitive information to those who need to see it, and use encryption software to protect customers’ financial information from theft during…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Exercise 1

    • 617 Words
    • 2 Pages

    The purpose of a Network is to share data. To make this possible, you have to be able to connect to other computers. To make this enticing to people to want to take advantage of this technology, it has to be simple not so complex. This sounds a little difficult to understand as far as a qualified answer, but to sum things up that is it. The question to ask and that many people don’t consider is how data is transferred from one computer to another computer?…

    • 617 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    chapter01

    • 7053 Words
    • 24 Pages

    These components work together to allow communication using public key cryptography and symmetric keys for digital signatures, data encryption, and integrity.…

    • 7053 Words
    • 24 Pages
    Good Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.…

    • 877 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Today, there are two ways that data can be transmitted. Either through a physical cable or through free space. There are a number of security considerations when using a physical cable. However, there are an even greater number of security considerations when transmitting through the free space.…

    • 3826 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Health and Social Care

    • 260 Words
    • 2 Pages

    | |1.2 Explain why it is important to have secure systems for recording and storing |…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    it104 Assignment 1

    • 721 Words
    • 3 Pages

    What is encapsulation? | A way to cross data over a any network link |…

    • 721 Words
    • 3 Pages
    Satisfactory Essays