0% found this document useful (0 votes)
35 views4 pages

Running Head: Uses of Encryption

Encryption is used by organizations to encode sensitive data and information to allow only authorized individuals to access it. There are different forms of encryption used depending on whether the data is at rest, in motion, or in use. Data at rest is typically stored in databases and encrypted using plugins or built-in database encryption. Data in motion between locations is encrypted using secure sockets during transfer. Data in use within an organization is encrypted by encrypting the full memory to protect it from third parties.

Uploaded by

Kevin Maraga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views4 pages

Running Head: Uses of Encryption

Encryption is used by organizations to encode sensitive data and information to allow only authorized individuals to access it. There are different forms of encryption used depending on whether the data is at rest, in motion, or in use. Data at rest is typically stored in databases and encrypted using plugins or built-in database encryption. Data in motion between locations is encrypted using secure sockets during transfer. Data in use within an organization is encrypted by encrypting the full memory to protect it from third parties.

Uploaded by

Kevin Maraga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Running head: Uses Of Encryption

Uses of encryption

Student’s name

University’s name

Course

Professor’s name

Date
Uses Of Encryption

Encryption is the method in which organization uses to encode their sensitive data and

information which helps the organization in only allowing the authorized people to access data and

help in keeping away unauthorized people from accessing the data. “Encryption involves a unique

mechanism which includes various keys between the authorized people where one is responsible

for encrypting the data” (Cash,2013). At the same time, the other decrypts the data which remains

confidential between the involved parties. There are different ways which are generally used in

encryption which helps in securing data — mostly used to protect the data that is stored in

networks of an organization or the computers.

Different forms of encryption are used depending on the kind of data that is being encrypted

and the state of data. One of these ways is when the data is at rest where this is information is

typically stored in the database, and hence there are various forms of protecting the data in the

database which include plugin the way. This is a way that has been embraced by many organization

since it requires less coding. Hence, it is more comfortable and only requires it to be attached to the

database, and it is independent, and therefore, less work is needed for using it.

Another way that is used to protect the data that is generally restored in the database is that

the mechanism of data encryption and decryption is applied within the database. The organization

has also embraced this method since no coding is done hence making it easier for people to use.

“Another way to encrypt data in the database is where every column in the database is made to

have a unique key” (Garg,2016). That identifies it and with this, only authorized people are

available with the allocated key; hence they are the only people who can access the database.
Uses Of Encryption

Encryption of data within organization also occurs when the data is in motion state. This is the

kind of data in the organization that awaits to be moved from one location to another which may

involve moving from one computer to another or moving from organization to another. Under this,

the data is encrypted to make sure the information is not accessed and that the middle medium

through which data passes do not have access to the data. Hence mechanism has been put across to

ensure that the data is being protected by the use of secure sockets which aim at providing there is

the secure private transfer of this data and hence the data cannot have access by a third party. This

tool of protecting data has incorporated the use of individual and also the public keys, and with this,

the mobile data is ensured that is secure.

Data in use also requires ways to put across to ensure that it is secure; this is the kind of

data within the organization that is being used while carrying different operations within the

organization. “Various ways are used to ensure that this data is encrypted which include using a

mechanism that will enable that the full memory is encrypted” (Wang,2018). By this, it protects the

data from being accessible by the third party and hence safeguards the data in use.
Uses Of Encryption

References

Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Roşu, M. C., & Steiner, M. (2013, August).

Highly-scalable searchable symmetric encryption with support for boolean queries.

In Annual Cryptology Conference (pp. 353-373). Springer, Berlin, Heidelberg.

Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., & Waters, B. (2016). Candidate

indistinguishability obfuscation and functional encryption for all circuits. SIAM Journal

on Computing, 45(3), 882-929.

Xu, J., Wei, L., Zhang, Y., Wang, A., Zhou, F., & Gao, C. Z. (2018). Dynamic fully

homomorphic encryption-based merkle tree for lightweight streaming authenticated data

structures. Journal of Network and Computer Applications, 107, 113-124.

You might also like