Thursday, June 22, 2017

Data Security and Encryption

After learning about hacking and how it compromises data security, we will learn about the next step in protecting data, by means of encryption. The very ancient and often used in technique of cryptography involves scrambling messages in such a way that only the parties within the communication or, in our case, a computer algorithm and users know how to decode them effectively.
We will first learn the basics on cryptography from the Encryption Tutorial. Another simple source is What is Cryptography? at WiseGeek.

Then we will play around with some of the games at CryptoClub.

Assignment After studying some of the methods and algorithms for encryption, we need to understand how this is done in real life.

Suppose you are an IT security consultant, and one of your clients asks you to review for him the various options (free and paid) that exist for encrypting sensitive data in his hard drive. Answer the following questions:

- Identify at least one software for personal and one for professional use that are available for encrypting sensitive data.
- For each of them, write a detailed sequence of instructions as to how to effectively encrypt the data.

Working in pairs, answer the question in a Word file. This file must be sent to itgs.sass@gmail.com, in encrypted form, together with another file that explains how to decrypt it, and why you have chosen that particular software.

2 comments:

Unknown said...

In order to guard against advanced threats in a complex and evolving climate of virtualization, cloud services, and mobility, while maintaining regulatory compliance, organizations must increasingly take a data-centric approach to safeguarding their sensitive information.
iDeals secure data rooms

Anonymous said...
This comment has been removed by the author.