29 Aug 2022

428

Encrypt and zip or zip and encrypt: which is better?

Format: APA

Academic level: University

Paper type: Essay (Any Type)

Words: 280

Pages: 1

Downloads: 0

With the growth of the web and smartphones over the past years, the internet and technology sector has generally experienced a surge in digital data. These data could be in the form of audio, text, or video. Since most network administrators handle such data on a daily basis, it has led to the increasing demand for storage spaces. Most organizations have therefore invested heavily in various storage devices to back up their data. However, with data compression, organizations are set to save storage capacity while speeding up file transfer as the technology reduces the number of stings required to represent information. Data compression is conducted by algorithms that determine how data sizes shrink, optimizing backup storage performances. Even though many programs can perform such activities, Winzip and 7Zip are the most common compression tools that use ZIP and RAR archive file format compressions, among many others. Since most organizations are adopting these tools into their daily backup activities, their security is more critical, and network administrators and other security experts should be aware of the proper procedure for encrypting and compressing organizational data.

While compression is essential, security is even more critical. Network administrators and other cybersecurity personnel within an organization should not compress data before encrypting it. Since encryption first turns data into random streams and relies on patterns to gain file size reduction, some individuals might prefer this method since compression algorithms might be unable to give much reduction size for encrypted data. However, the method exposes these data to a side-channel attack called compression oracle, which malicious attackers can use to remove plaintext information. With such data, hackers can cause stings to be places into unknown data streams of plain texts leading to data breaches. Examples of such methods of attacks include CRIME and BREACH, whereby hackers attacked SSL/TLS ( Alsing & Wandelt, 2018). 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

References 

Alsing, J., & Wandelt, B. (2018). Generalized massive optimal data compression.  Monthly Notices of the Royal Astronomical Society: Letters 476 (1), L60-L64. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Encrypt and zip or zip and encrypt: which is better?.
https://studybounty.com/encrypt-and-zip-or-zip-and-encrypt-which-is-better-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 88

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration