Saturday, February 15, 2020

Encryption Exploitation Technologies Research Paper

Encryption Exploitation Technologies - Research Paper Example It is in this regard that organizations have come up with security policies which define how data should be secured for confidentiality, authenticity, privacy, integrity, access control and nonrepudiation (Knott & Steube, 2011). The process of encryption employs different methods with a view of ensuring that information in its original and natural format is altered or converted into formats which cannot be read by systems attackers. Hence encryption is basically viewed at ascertaining that it is only the intended receivers who are able to read the message. This research paper gives a critical discussion of the nature and approaches of execution of the common methods that are used in the exploitation of encryption technologies. Symmetric Encryption Symmetric encryption is one of the major methods that are used in computer security in the exploitation of encryption technologies. In symmetric encryption, both the receiver and the sender of data or information have the same key or encryp tion key (Ackerman, 2008). In this regard, symmetric encryption is also known as shared secret encryption or shared key encryption (Lian, Liu, Ren & Wang, 2007). The encryption key in symmetric encryption method is applied both when encrypting and decrypting data. The security behind symmetric encryption lies in the fact that it is only the individuals with the same key who are able access and read data, information or messages which have been encrypted by the use of the symmetric key (Knott & Steube, 2011). Symmetric encryption has existed as the oldest methods on utilizing encryption technologies. It is essentially used for secure transmission of data. As a result, data that has been transmitted through the symmetric encryption is said to be confidential (Bhargava, Shi & Wang, 2007). In this sense confidentiality means that the understanding of meaning which is carried within the data can only be achieved by systems or individuals that share the same key. In this regard, it is evi dent that symmetric encryption is aimed at preventing unauthorized entities from understanding data rather than preventing them from accessing it (Dent, 2008). Therefore even if attackers access data, they are not able to understand its meaning since it is encrypted (Ackerman, 2008). Figure 1: Symmetric Encryption (PacketLife.net, 2010) It is important to note that encrypted data remains to be data. What changes is the inability for unauthorized entities to have and understanding or acquires the meaning that is contained therein (Moore, 2007). Due to encryption, the purpose of messages serves only the intended recipients (Al-Riyami, Malone-Lee & Smart, 2009). Symmetric encryption makes use of various algorithms. An encryption algorithm the word used to describe the mathematical formula which is employed in both the encryption and decryption of data files during the process of electronic data transfer or communication (Toubba, 2008). It is therefore the function of the encryption alg orithm to convert electronic formats of data into formats that are difficult to understand by the unintended audience. Since the intended receivers have the same key as the sender, symmetric methods in encryption allows them to read and comprehend the encrypted data. This is made possible by the use of the key and the symmetric algorithm to

Sunday, February 2, 2020

Samsung Galaxy vs. Apple iphone (Actual Termpaper) Essay

Samsung Galaxy vs. Apple iphone (Actual Termpaper) - Essay Example Additionally, the devise solutions section is divided into either semiconductor or LCD division. The company has grown significantly both in profitability and innovations with new products being released year in year out. As it celebrated its 40 years of operations in 2009, Samsung Electronics was ranked first among worldwide IT companies; a fete that the company had not achieved previously.3 In 2010 Fortune 500 ranking, Samsung was placed twenty second and this was a rise with ten places and became the ever best placed Korean Company. Samsung Galaxy phone is among the most recent product released by Samsung Electronics as it continues to offer its customers products that are update with changes in technology. The first Samsung Galaxy phone in the series was released in June 2009. On the other hand, Apple iPhone is produced by Apple formed in 1976 by Steven Wozniak and Steven Jobs. For a long time during its existence, Apple concentrated in manufacture of computer although in the pas t decade Apple stopped specializing in computers alone positioning it to compete with other players in the industry.4 For instance in 2001, Apple produced iPod and since then the company has become a major producer of music players. In 2007, Apple Company entered into the mobile phone sector with release of its Apple iPhone. Apple operates under the philosophy of â€Å"comprehensive aesthetic design† and uses unique advertising campaigns and this has enabled the company establish a strong reputation in electronics industry and retain a strong consumer base.5 This report compares and contrasts management strategies used by Samsung and Apple Inc to distribute their smart phones in an international market. Samsung Galaxy and Apple iPhone In July 2009, Samsung Electronics released its first smart phone; Samsung Galaxy, model i7500. Samsung Galaxy is a series of different models of phones manufactured to run on Android operating system (OS).6 The fact that these phones are develop ed to operate on Android OS allows them to run different applications giving users different functionality. The move to manufacture Galaxy phones were changes in technology and availability of Android which is an open source OS, that is, it can be accessed freely from the internet. Additionally, Samsung wanted to offer to its consumers a product which can run an array of applications. By using Samsung Galaxy phones, users are able to download materials using high internet downloading capabilities, can access libraries from their phones and a large internal storage space.7 Samsung Galaxy also offers customers high quality music and pictures given that they run various music players. Samsung Galaxy phones have a relative small dimension that therefore a user can carry it a round comfortably in the pocket.8 Following the release of the first Galaxy phone, Samsung Electronic has continued in innovating and has been releasing a new model into the series. For instance, in November 2009, i 5700 was released and this was followed by the introduction of Samsung Galaxy S (i9000) in June 2010.9 Samsung Galaxy S III (GT-i9300) is latest Galaxy phone to be released into the market in May 2012. Galaxy phone are categorized in different classes defined by letters S, R, W, M and Y. Galaxy phones in the S and R