Running Head: Uses of Encryption
Running Head: Uses of Encryption
Uses of encryption
Student’s name
University’s name
Course
Professor’s name
Date
Uses Of Encryption
Encryption is the method in which organization uses to encode their sensitive data and
information which helps the organization in only allowing the authorized people to access data and
help in keeping away unauthorized people from accessing the data. “Encryption involves a unique
mechanism which includes various keys between the authorized people where one is responsible
for encrypting the data” (Cash,2013). At the same time, the other decrypts the data which remains
confidential between the involved parties. There are different ways which are generally used in
encryption which helps in securing data — mostly used to protect the data that is stored in
Different forms of encryption are used depending on the kind of data that is being encrypted
and the state of data. One of these ways is when the data is at rest where this is information is
typically stored in the database, and hence there are various forms of protecting the data in the
database which include plugin the way. This is a way that has been embraced by many organization
since it requires less coding. Hence, it is more comfortable and only requires it to be attached to the
database, and it is independent, and therefore, less work is needed for using it.
Another way that is used to protect the data that is generally restored in the database is that
the mechanism of data encryption and decryption is applied within the database. The organization
has also embraced this method since no coding is done hence making it easier for people to use.
“Another way to encrypt data in the database is where every column in the database is made to
have a unique key” (Garg,2016). That identifies it and with this, only authorized people are
available with the allocated key; hence they are the only people who can access the database.
Uses Of Encryption
Encryption of data within organization also occurs when the data is in motion state. This is the
kind of data in the organization that awaits to be moved from one location to another which may
involve moving from one computer to another or moving from organization to another. Under this,
the data is encrypted to make sure the information is not accessed and that the middle medium
through which data passes do not have access to the data. Hence mechanism has been put across to
ensure that the data is being protected by the use of secure sockets which aim at providing there is
the secure private transfer of this data and hence the data cannot have access by a third party. This
tool of protecting data has incorporated the use of individual and also the public keys, and with this,
Data in use also requires ways to put across to ensure that it is secure; this is the kind of
data within the organization that is being used while carrying different operations within the
organization. “Various ways are used to ensure that this data is encrypted which include using a
mechanism that will enable that the full memory is encrypted” (Wang,2018). By this, it protects the
data from being accessible by the third party and hence safeguards the data in use.
Uses Of Encryption
References
Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M. C., & Steiner, M. (2013, August).
Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., & Waters, B. (2016). Candidate
on Computing, 45(3), 882-929.
Xu, J., Wei, L., Zhang, Y., Wang, A., Zhou, F., & Gao, C. Z. (2018). Dynamic fully