Protecting Data Through Encryption | Instant Homework Help

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet the deadline. RESPONSE 1: Which one of the following statements is most correct about data encryption as a method of protecting data? For this week’s forum we had to review or examine statements that were provided to us. To answer the above question, I chose to discuss is number 4: it requires key management. Key management refers to the process of managing cryptographic keys for a system. The management involves the creation, exchanges, and protection of these keys. Key management is also involved in monitoring and accesses made by individuals in the system. Encrypted messages can be read by authorized users, but not by those who do not have permission. One good way to practice good key management practices is to physically make sure hardware and all systems being used are store properly, and securely from anyone who can easily access them physically. Another great practice to make sure that all of the systems is up to date. It is also important to have a key life cycle, as we learned in our labs for last week. To also make sure that they are properly stored somewhere other than the systems in which they are used in to make sure that there is a back up if something bad were to happen. Performing audits can prevent from cryptic keys to get hacked or stolen. Audits can also ensure. RESPONSE 2: I hope everyone is having a good week so far. This week we are talking about public key infrastructure and data encryption as a method of protecting data. Out of the options we were given I would say that careful key management is the most correct. We as humans lose things all the time. I know I always misplace my phone and the tv controller. When looking at key management there are 3 different types of protocols with the main goal being centralized. You want the key to be able to move through the department. To implement centralized protocols you need the proper equipment, policies in place to handle the keys and processes to implement the activities.”Centralized key management enables proper key governance, even when data and people move from department to department throughout an organization” (Kazarian, 2019). “If your key server capabilities don’t mesh well with the key governance requirements, implementing centralized key management becomes very difficult” (Kazarian, 2019).Resources: Kazarian, J. (2019, January 22). An essential guide to encryption key management in the enterprise. Retrieved June 30, 2020, from https://techbeacon.com/security/centralized-encryption-key-management-why-you-need-it-how-deploy-it

Don't use plagiarized sources. Get Your Custom Essay on
Protecting Data Through Encryption | Instant Homework Help
Get a 15% discount on this Paper
Order Essay
Quality Guaranteed

With us, you are either satisfied 100% or you get your money back-No monkey business

Check Prices
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know that being a student these days is hard. Because of this, our prices are some of the lowest on the market.

Instead, we offer perks, discounts, and free services to enhance your experience.
Sign up, place your order, and leave the rest to our professional paper writers in less than 2 minutes.
step 1
Upload assignment instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
s
Get personalized services with My Paper Support
One writer for all your papers
You can select one writer for all your papers. This option enhances the consistency in the quality of your assignments. Select your preferred writer from the list of writers who have handledf your previous assignments
Same paper from different writers
Are you ordering the same assignment for a friend? You can get the same paper from different writers. The goal is to produce 100% unique and original papers
Copy of sources used
Our homework writers will provide you with copies of sources used on your request. Just add the option when plaing your order
What our partners say about us
We appreciate every review and are always looking for ways to grow. See what other students think about our do my paper service.
Other
I requested two pages and only have one page and the second pages is references.
Customer 452475, August 22nd, 2022
Eng 099
I recveived a B on this paper but I'm not sure why.
Customer 452775, June 18th, 2022
Other
AWESOME
Customer 452813, June 20th, 2022
Database design and optimization
communication was great and the work looks perfect.
Customer 452715, February 26th, 2022
History
thank you so much for the help, I really appreciate that.
Customer 452725, February 13th, 2022
Technology
Excellent job on the paper!
Customer 452885, December 28th, 2022
Other
great
Customer 452813, June 25th, 2022
Literature
Great
Customer 452813, July 10th, 2023
Nursing
Awesome work!!!!!!
Customer 452453, March 24th, 2021
Social Work and Human Services
Thank you for the great job
Customer 452469, February 3rd, 2021
Criminal law
Thank You!
Customer 452465, January 29th, 2021
Marketing
Yes and thank you
Customer 452701, October 25th, 2022
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.