Vērtējums:
Publicēts: 10.04.1997.
Valoda: Angļu
Līmenis: Vidusskolas
Literatūras saraksts: Nav
Atsauces: Nav
  • Eseja 'Computer Security', 1.
  • Eseja 'Computer Security', 2.
Darba fragmentsAizvērt

Encryption is method of scrambling data in some manner during transmission. In periods of war, the use of encryption becomes paramount so those messages are not intercepted by the opposing forces. There are a number of different ways to protect data during transmission, such as Substitution (character for character replacement) in which one unit (usually character) of cipher text (unintelligible text or signals produced through an encryption system) is substituted for a corresponding unit of plain text (the intelligible text or signals that can be read without using decryption), according to the algorithm in use and the specific key.
The other method is Transposition (rearrangement characters) which is the encryption process in which units of the original plain text (usually individual characteristics) are simply moved around; they appear unchanged in the cipher text for their relative location.
Study Case (Bank of Shenandoah Valley)
While both encryption and authentication method are providing some measures of security, the implementation of security itself has totally a different approach. …

Autora komentārsAtvērt
Atlants