27 Sep 2022

196

Firewalls and Encryption: How They Work Together to Protect Your Data

Format: APA

Academic level: College

Paper type: Assignment

Words: 294

Pages: 1

Downloads: 0

The encryption protection and firewall protection are both aimed at the larger security strategy. The firewall protection within infrastructure protection and information security is the same as a home security system. For firewall protection to be considered adequate, the information and policies require businesses’ and organization’s support. A firewall is either a physical or software device found between the internet and the computer. The firewall aims to ensure internet connection control, permitting given traffic to exit or enter the computer while keeping specific connections from the permission (Dandamudi & Eltaeib, 2015). Firewalls help divide the information technology into two segments: the untrusted zone and the trusted zone. 

On the other hand, encryption protection is about a data security approach by making the data nonsensical, using a necessary code to perform decryption. Classified information can be harmful in the wrong people’s hands. For instance, since e-commerce can be protected using the internet, credit information is not often safe at the merchant’s site. It becomes significant to ensure the decryption of e-commerce data on one end. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The type of protection essential in securing digital information is encryption. The reason is that a sufficient amount of private information is often shared through the internet, including social security numbers and financial information (John Justin & Manimurugan, 2012). It is essential to keep the data safe. Multiple websites and apps depend on password verification software and user passwords to enhance valuable data access. Besides learning how to develop secure passwords, most people cannot perform detailed password-encryption besides using the password manager. Understanding adequate data protection requires encryption to be of high quality. For instance, government and business organizations that possess employee and consumer data must have AES encryption and other approaches such as two-factor authentication to permit authorized data access by the required users. Therefore, encryption is the core of securing digital information. 

References 

Dandamudi, S., & Eltaeib, T. (2015). Firewalls implementation in computer networks and their role in network security.  Journal of Multidisciplinary Engineering Science and Technology (JMEST) 2 (3). 

John Justin, M., & Manimurugan, S. (2012). A survey on various encryption techniques.  International Journal of Soft Computing and Engineering (IJSCE) ISSN 2231 , 2307. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Firewalls and Encryption: How They Work Together to Protect Your Data.
https://studybounty.com/firewalls-and-encryption-how-they-work-together-to-protect-your-data-assignment

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

The 1931 Central China Flood

The country of China was a vibrant agricultural hub in the early 18th century. The agriculturists cultivated on every available fertile piece of land. Their activities disrupted wetlands and Nanyang trees were felled...

Words: 625

Pages: 2

Views: 143

2009 Washington DC Metro Train Collision

The 22 nd of June 2009 saw the collision of two southbound Red Line Washington Metro trains. The total number of casualties was nine with tens of others being injured. According to DC Metro, the cause of the accident...

Words: 554

Pages: 2

Views: 80

Comparing and Contrasting the Rural, Urban, and Insurgent Models of Terrorism

In the purest sense, the term terrorism refers to the application of intentional brutality and violence, in general against unarmed civilians, mainly for political reasons. The term was coined during the French...

Words: 325

Pages: 1

Views: 518

Understanding Response and Recovery

The emergency management system will have to change the response and recovery protocols for better response to an emergency. The changes in the system will entail new official organizations and primed plans for...

Words: 374

Pages: 1

Views: 209

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

Radicalization is a concept that refers to the gradual social processes used to explain changes in behaviours or ideas. There is a clear distinction between behavioural and cognitive dimensions of...

Words: 1951

Pages: 7

Views: 134

Information Sharing and Collaboration: Department of Homeland Security

The Department of Homeland Security (DHS) has many intelligence agencies used for protecting American citizens. The various agencies should collaborate by sharing information to combat threats to Americans....

Words: 307

Pages: 1

Views: 63

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration