Encryption As A Countermeasure For Information Assurance
Encryption As A Countermeasure For Information Assurance
Assurance
1.Introduction:
Encryption is one of the most trusted measure for data safety in a digital world where
any and every information can be accessed, intercepted or tampered without proper
control. In short, it is a technology where data or plaintext can be turned into cipher
text or unreadable by using encryption and decryption keys. Only authorized people
with the appropriate decryption key can convert it to its original plaintext form again,
making sure that intercepted data is still encrypted and confidential.
Encryption is a crucial way to protect confidential information, like records and data
that are personal or private in nature, financial datum which needs securing. It is
used in many industries and activities to secure information during data in transit, at
rest or use. In what follows, we look at encryption from an specifications and review
perspective who would use it why they do so as well see a good example for how the
timeline of encrypted email conversation. A graphic description of email security and
encryption, how it works to protect information assets, what the vulnerabilities are
and finally: How encryption addresses those same specific threats
4. Encryption: who would use it and why? Encryption is a must for any daily user
or enterprise dealing with classified data. The uses of it are many, and in certain
sectors where great quantities of personal data, financial or sensitive information is
handled the encryption becomes even more important.
Financial Services: In the banking and other financial institutions, encryption is used
to protect information regarding credit card numbers, bank account details or maybe
a list of transactions. Encrypted data remains secure whether it is at rest or in transit,
which helps to ensure compliance with PCI DSS and prevents financial fraud.
Healthcare: Organizations in healthcare are required by HIPAA to encrypt electronic
health records (EHR) and patient data. The encryption is aimed to avoid
unauthorized access of the sensitive information and this will also help in not
disclosing medical secrets that can lead identity thefts i.e. impersonation or health
insurance fraud.
Online retail: Merchants protect their customers' payment information by encrypting
it for online transactions. It is necessary for securing sensitive information like credit
card numbers and maintaining customer privacy. SSL/TLS encryption is commonly
used by websites to protect information when requesting and exchanging data from
the server over the web.
Government Agencies: Government organizations use encryption to secure
classified information from decryption by unauthorized third parties and comply with
data protection requirements that cover national security issues.
Encryption Application
Encryption is applied at both stages (in transit and at rest) to ensure that sensitive
data, such as the contents of the email, are protected. TLS/SSL encryption secures
data in transit, while endpoint encryption protects data at rest.
Limitations of Encryption:
Key Management: If encryption keys are lost or mishandled, legitimate users may
lose access to their own data.
End-to-End Gaps: If encryption is not applied end-to-end, the data might still be
exposed at points where it is decrypted.
Performance Impact: Encrypting and decrypting data, especially for large volumes,
can slow down system performance.
7. Conclusion
Encryption is one of the most reliable countermeasures available today for
information assurance, providing critical protection against unauthorized access,
interception, and tampering. It is used across a variety of industries, including
finance, healthcare, e-commerce, and government, to secure sensitive data. While
encryption is highly effective, it must be implemented correctly to avoid vulnerabilities
such as poor key management or gaps in end-to-end encryption. Secure email
communication is just one example where encryption ensures that sensitive
information remains protected during transmission and storage. Despite its
limitations, encryption remains a cornerstone of modern information security
strategies.
Reference:
Stallings, W. (2017). Cryptography and Network Security: Principles and Practice (7th ed.).
Pearson Education.
Dierks, T., & Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol Version 1.2
(RFC 5246). Internet Engineering Task Force (IETF).
Bishop, M. (2018). Introduction to Computer Security (2nd ed.). Pearson Education.
Microsoft Documentation (2021). Email Encryption in Office 365.