5 Dec 2022

77

Encryption Methodologies for Protecting an Organization’s Data

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 723

Pages: 2

Downloads: 0

Expansion of networking has created an all-inclusive industry that had not existed before. Network security focuses on the primary protection of a trusted internal network which is from an organization or business from the potential dangerous actors. However, the industry has been facing challenges from the cyber-attacks, human errors, and other security challenges. Legacy security measures, for instance, antivirus and firewalls, data loss prevention DLP) have offered little protection and limited the productivity of end users respectively. This has resulted in the evolution of the security industry in efforts of mitigating the vices. Unfortunately, the bad guys have also evolved their methods in aims of comprising the corporate networks. CIOs and their organizations are searching for better ways of protecting their data through encryption methods across the entire data life cycle. In both cases, employment of the encryption key is the only way for anyone to access the unencrypted version of your password. This paper advocates on the enrollment of encryption policies in organizations. 

For many years the Navy Federal Credit Union has been the most ideal and trusted financial institution serving the military and their families. The organization protects their client’s personal information from nonaffiliated third-party companies that include; telephone number, social security number, a name of a client, access number, physical address, and email address. Some of the third-party companies may use other companies to help them gain personal information. Also sensitive to protection is the account information belonging to clients. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

In symmetrical encryption, only one secret key is used to encrypt or decrypt information which makes it merely simple. The secret key can be a number, random letters or word shared between a sender and a receiver. In this case, if a client wishes to use various e-banking services, access to account information have to be granted to the third parties. Acquiring that account data will require a secret key of which is very personal. The receiver or the third party with the shared key will then be authorized to access the account and transaction if any (Deshmukh et al., 2013). 

Before the gain of account and personal information, the key has to be exchanged from the account holder, third party and the Navy Federal Organization. This data is both encrypted and decrypted using a single private key. Apart from the symmetrical authentication, is the second policy of asymmetrical encryption, in case the personal information and account information remains with the third party company, the Navy Federal network will ask an SSL/TLS certificate from the client requesting for account information. The certificate has a public key used in the identification of the actual account holder. Conclusively, the data is encrypted using a public key and decrypted using a private key or the vice-versa 

Cybersecurity threat is a primary concern that could compromise the organization’s data. For instance, the Equifax breach is a cybersecurity threat experienced by many financial institutions. This problematic issue is difficult to counter due to its dynamic nature which gives the financial institution a hard time in keeping up with it. Second, cyber-attackers could also comprise the organization’s data, as they are always adopting new techniques to stay ahead of threat mitigation tools such as data encryption. Lastly is the ransomware, Trojan virus and other imminent threats that steal credentials (Abomhara, 2015). 

To begin with, collaboration among the members of management is crucial in the aim of identifying high-risk areas such as data backups and mobile devices. Data classification should follow, whereby information is divided into predefined groups that share a common risk including encryption data. Next is the establishment of keys and certificates management that helps detect anomalous behavior, for example, rogue self-signed certificates (Manousais et al., 2013). Once proper management has been established searching for the right encryption solution is crucial, this can either be symmetrical or asymmetrical. Authorized users are the only ones supposed to access data to avoid it being tampered with. Two-factor authentication, and an adequate combination of passwords and file permissions is highly recommended. Written policies should then be written and communicated to third parties and end-users and if they seem not to comply with the policies then they are not allowed access to the clients’ data. Finally, SSL decryption technology is deployed to ensure transparency of crucial data, at points of egress and ingress. 

Data encryption as a solution for data protection can provide encryption to data, devices, and emails. Organizations and companies are challenged in data protection and data loss due to the wide usage of web applications and external devices in performing their businesses. Encryption is intended to provide an extra layer of data protection however strict access controls and policies are necessary for the convenient functioning of data protection. 

References 

Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks.  Journal of Cyber Security and Mobility 4 (1), 65-88. 

Deshmukh, D., Pasha, A., & Qureshi, D. (2013). Transparent Data Encryption--Solution for Security of Database Contents.  arXiv preprint arXiv:1303.0418

Manousakis, V., Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2013, June). Privacy in the cloud: bridging the gap between design and implementation. In  International Conference on Advanced Information Systems Engineering  (pp. 455-465). Springer, Berlin, Heidelberg. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Encryption Methodologies for Protecting an Organization’s Data.
https://studybounty.com/encryption-methodologies-for-protecting-an-organizations-data-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 82

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 87

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 128

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration