GROUP 2 Osh
GROUP 2 Osh
Scrambling plan text into unreadable ciphertext, which can only be deciphered
with a unique key. For example, this is like locking a door with a key , only those
with the right key can access the contents.
Shielding from unauthorized access or interception during transmission.
Mitigating the risk of Data theft and loss by making stolen data unusable
without encryption keys. It’s important for sensitive information like student
records and financial data.
Ensuring confidentiality , especially during data transit and storage. This helps
to prevent unauthorized access even if physical device is compromised.
Complying with data protection regulations and mitigating insider threats. Many
regulations, such as HIPAA ( Health Insurance Portability And Accountability Act)
and GDPR (General Data Protection Regulation) require organisations to
implement strong encryption measures to protect sensitive data.
2. WHAT ENCRYPTION STANDARDS SHOULD BE IMPLEMENTED FOR STUDENT
INFORMATION , FACULTY RECORDS, AND RESEARCH DATA?
Answer: AES, it offers a high level of security, making it resistant to all known practical
attacks.
It uses different kinds of keys which allows for different levels of security based on the
sensitivity of the data.
It complies with various data protection regulations such as GDPR and HIPAA
3.WHAT TOOLS OR METHODS CAN ENSURE DATA INTEGRITY?