31 Aug 2022

158

The Difference Between Firewall and Encryption Protections

Format: APA

Academic level: University

Paper type: Coursework

Words: 411

Pages: 1

Downloads: 2

Cases of cybercrimes, such as hacking, has increased all over the world and costs organizations and individuals millions of dollars. These malicious activities have breached the integrity and confidentiality of data stored on a computer transmitted through a network. The use of firewalls and data encryption are some of the techniques used to secure the data. However, the methods differ in how they offer protection. This paper discusses the difference between firewall protection and encryption protection of information. 

Firewall protection is a network device that blocks traffic on a network, creating a barrier between a trusted network and untrusted networks. It is usually located between a local and public network to create a block for intruders as they try to access information from the system (Spasic & Dihovicni, 2019) . It safeguards an organization’s network and keeps monitoring the systems and keeping logs that alert an individual if there is an intrusion (Schafer, 1997) . Firewalls aim at preventing the spread of attacks on a computer. The firewall ensures that some computer ports that are being unused are closed and regulate the most used ports on the computer. Firewall protection divides the network into a trusted zone and an untrusted sites. It controls the internet connections by granting permission to specific traffic to pass through and exit. For example, an organization can set up a network that accepts files within their systems but rejects other files outside the organization. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

On the other hand, the encryption technique is the process of encoding data such as files to make it unreadable. The technique applies an algorithm for encrypting data, and then keys for the receiving party for decrypting the information. Information is encrypted into a cyphertext, and the cryptographic technique is used to keep the data secure from access (Wong, 1996) . The encryption technology ensures that the data is meaningless to unauthorized parties. For example, when a person wants to send a confidential email to another party, he/she can use a program that obscures its content such that the other party can only read it. 

The most effective data protection technique for data protection, I believe, is the encryption technique. It allows one to securely protect data that you don't need other people to gain access to. It encrypts information making it unreadable to other people except for the intended party; therefore, it can’t be stolen as its meaningless to other people. Encryption technique ensures data integrity and integrity as hackers cannot access your data and use it for malicious activities. Therefore, organizations, individuals, and the government need to apply the necessary encryption techniques to ensure their information safety. 

References 

Schafer, S. (1997). Is your data safe? Inc, 19 (9), 93. http://library.ashford.edu/EzProxy.aspx?url=http://search.ebscohost.com.proxy-library.ashford.edu/login.aspx?direct=true&db=f5h&AN=9706183728&site=eds-live&scope=site 

Spasic, M., & Dihovicni, D. (2019). PROTECTION OF DATABASE IN MACHINE INDUSTRY AND DEFENSE OF CYBER ATTACK WITH ANTIVIRUS AND FIREWALL PROTECTION. Applied Engineering Letters, 4 (2), 66-71. 

Wong, S. T. (1996). A Cryptologic Based Trust Center for Medical Images. Jamia. 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). The Difference Between Firewall and Encryption Protections.
https://studybounty.com/the-differerence-between-firewall-and-encryption-protections-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration