SlideShare a Scribd company logo
Security Issues Concerning Cryptosystems
Students Name
Institution Name
Instructor Name
Date
Introduction
In industry technology, cryptography refers to a technology that
has the power to perform significant functions in discoursing
specific forms of data susceptibility to attack.
It involves computer system security together with its operation
network safety which functions towards accomplishing common
subjects.
Cryptography in the technology industry is used to secret
information from attack by unofficial groups, mostly during the
exchange of information through entities when it is most
unprotected to interception (Deb, 2007) .
It ensure that data is secure and confidential to all activities in
the technology industry.
2
Security Threats To Technology Industry
Some of the common security threats in the technology industry
include;
Privilege escalation which entails structured software activities
that in many times have problems that can be exploited and
have the power to access data significantly from sites protected
from unauthorized users or applications and cause damages.
A virus is the other threat which involves computer software
which has the power to copy and cause problems to other
devices.
The trojan threat also known as Trojan horses are structured
activities that aim at authorizing hidden hackers to enter into a
computer and affect services and cause data issues Veronica
(Henry,2010) .
The bugs in the privilege escalation threat act by tolerating
approach to specific resources with significant rights that can
avoid security measures.
The virus threat is transferred via interconnected networks or
sharing devices like USB and portable means.
The main role of adware is to improve the focus on the
demonstration of web advertisements.
3
Cont,
Spyware is a threat that can enter into a computer device via
downloaded software and collect significant user data by tracing
the internet functions and transferring that to attacking
components.
Adware is a threat that functions just like spyware by
monitoring individuals activities in a computer through internet
scanning actions.
Impacts of security threats
In the technology industry the threats mentioned above have led
to impacts like;
Social media attacks where social attackers are influencing
social platforms as a way to spread risks known as water holing.
They also cause a lack of encryption which is essential for
guarding confidential data.
The threats also cause outdated security software making them
unable to prevent information from attacks.
They also cause inadequate security technology with weak
security.
Countermeasure
Some of the fundamental countermeasures the technology
industry uses include;
Ensuring strong password management
Employing firm security guards
Applying access management around an operating system
The sector also involves the implementation of important
input/output systems known as BIOS password
Additionally, it also offers security awareness training sessions
to ensure that all workers have sufficient knowledge (Michael,
2010)
The term countermeasure delegate to a procedure or practised
used by organizations to stop security threats.
6
Conclusion
In summary, cryptosystems are useful pieces of equipment when
used in the technology industry because they have the power to
provide security and confidentiality to information. For
example, they guard the industry data and ensure safety to all
communications. Nevertheless, modern industries should target
at utilizing the systems to improve their activities and privacy
in different areas.
References
Veronica Henry. (2010) Top 10 Security Threats Every IT Pro
Should Know | Pluralsight. Retrieved May 6, 2010, from
https://www.pluralsight.com/blog/it-ops/top-10-security-threats
Deb Shinder . (2007) News, Tips, and Advice for Technology
Professionals - TechRepublic. Retrieved July 16, 2007, from
https://www.techrepublic.com/blog/10-things/10-physical-
security-measures-every-organization-should-take/
Michael Sanchez. (2010) The 10 most common security threats
explained. Retrieved December 9, 2010, from
https://blogs.cisco.com/smallbusiness/the-10-most-common-
security-threats-explained
Running Head: MODERN INDUSTRY AS A TECHNOLOGY
INDUSTRY 1
MODERN INDUSTRY AS A TECHNOLOGY INDUSTRY
2
Topic proposal for Cryptosystems in Modern industry
Modern Industry as a Technology Industry
Student Name
Institution Name
Instructor Name
Date
The topic of modern industry as a technology industry explains
how the application of modern technology has improved
different organization functions. According to the ideologies of
scientists, the introduction of modern technology in industries
has greatly made companies to be included in the fourth
industrial revolution. With reference to "Cryptosystems in
Modern Industry", I selected this topic because the use of
modern technology in industry has led to cryptosystems in
modern industry that entail intricate association of hardware
and software that assists in changing plaintext statements into a
sequence of unrecognizable elements, termed as cipher text,
transformed gain to their initial format. Symmetric and
asymmetric cryptosystems are the mainly used cryptosystems
that depend on key use and sound management actions the keys
in order to ensure that they are secure. Symmetric plays the best
tasks and involve the use of safe techniques for replacing keys
between active members. Asymmetric system, on the other
hand, does not require participants to replace keys among each
other, but instead, their functioning does not require a lot of
time. This means that cryptosystems play great roles in ensuring
electronic communication through encryptions and computer
privacy in industries (Katz & Lindell, 2014).
However, with technology in modern industries, cryptosystems
use the Quantum key distribution as a way of ensuring security
in communication by putting in practice the cryptographic
protocol. With quantum mechanism elements, communication
groups can use a common secretly distributed key that is not
known by the parties but it encrypts and decrypts data. The
members who rely on these shared random keys can sense when
third-party individuals are attempting to strike the key.
However, application of quantum perplexity, eavesdropping can
be traced through the establishment of communication program
(Bitzinger, 2009). In summary, modern industry is a technology
industry because cryptosystems in Modern Industry have played
significant roles in ensuring organization privacy and secrecy.
This is because cryptosystems are potential in ensuring industry
overall data and communication security. These cryptosystem
tools are strong but they always perform best when used
together with other tools like firewalls, security networks, and
access controls. Therefore, organizations should focus on using
technology in order to advance a lot of functions, ensure speed
and security in various sectors (Nick, 2018).
References
Nick Ismail, (2018) how modern technology is helping various
industrial sectors to advance. Retrieved 26 March 2018, from
https://www.information-age.com/modern-technology-
industrial-sectors-advance-123471231/
Katz, J., & Lindell, Y. (2014) Introduction to Modern
Cryptography, Second Edition. CRC Press
Bitzinger, R. A. (2009). The Modern Defense Industry:
Political, Economic, and Technological Issues: Political,
Economic, and Technological Issues. ABC-CLIO

More Related Content

Security Issues Concerning CryptosystemsStudents NameInstitu.docx

  • 1. Security Issues Concerning Cryptosystems Students Name Institution Name Instructor Name Date Introduction In industry technology, cryptography refers to a technology that has the power to perform significant functions in discoursing specific forms of data susceptibility to attack. It involves computer system security together with its operation network safety which functions towards accomplishing common subjects. Cryptography in the technology industry is used to secret information from attack by unofficial groups, mostly during the exchange of information through entities when it is most unprotected to interception (Deb, 2007) . It ensure that data is secure and confidential to all activities in the technology industry. 2 Security Threats To Technology Industry Some of the common security threats in the technology industry include; Privilege escalation which entails structured software activities that in many times have problems that can be exploited and have the power to access data significantly from sites protected from unauthorized users or applications and cause damages. A virus is the other threat which involves computer software which has the power to copy and cause problems to other
  • 2. devices. The trojan threat also known as Trojan horses are structured activities that aim at authorizing hidden hackers to enter into a computer and affect services and cause data issues Veronica (Henry,2010) . The bugs in the privilege escalation threat act by tolerating approach to specific resources with significant rights that can avoid security measures. The virus threat is transferred via interconnected networks or sharing devices like USB and portable means. The main role of adware is to improve the focus on the demonstration of web advertisements. 3 Cont, Spyware is a threat that can enter into a computer device via downloaded software and collect significant user data by tracing the internet functions and transferring that to attacking components. Adware is a threat that functions just like spyware by monitoring individuals activities in a computer through internet scanning actions. Impacts of security threats In the technology industry the threats mentioned above have led to impacts like; Social media attacks where social attackers are influencing social platforms as a way to spread risks known as water holing. They also cause a lack of encryption which is essential for guarding confidential data. The threats also cause outdated security software making them unable to prevent information from attacks. They also cause inadequate security technology with weak
  • 3. security. Countermeasure Some of the fundamental countermeasures the technology industry uses include; Ensuring strong password management Employing firm security guards Applying access management around an operating system The sector also involves the implementation of important input/output systems known as BIOS password Additionally, it also offers security awareness training sessions to ensure that all workers have sufficient knowledge (Michael, 2010) The term countermeasure delegate to a procedure or practised used by organizations to stop security threats. 6 Conclusion In summary, cryptosystems are useful pieces of equipment when used in the technology industry because they have the power to provide security and confidentiality to information. For example, they guard the industry data and ensure safety to all communications. Nevertheless, modern industries should target at utilizing the systems to improve their activities and privacy in different areas. References Veronica Henry. (2010) Top 10 Security Threats Every IT Pro Should Know | Pluralsight. Retrieved May 6, 2010, from https://www.pluralsight.com/blog/it-ops/top-10-security-threats Deb Shinder . (2007) News, Tips, and Advice for Technology Professionals - TechRepublic. Retrieved July 16, 2007, from
  • 4. https://www.techrepublic.com/blog/10-things/10-physical- security-measures-every-organization-should-take/ Michael Sanchez. (2010) The 10 most common security threats explained. Retrieved December 9, 2010, from https://blogs.cisco.com/smallbusiness/the-10-most-common- security-threats-explained Running Head: MODERN INDUSTRY AS A TECHNOLOGY INDUSTRY 1 MODERN INDUSTRY AS A TECHNOLOGY INDUSTRY 2 Topic proposal for Cryptosystems in Modern industry Modern Industry as a Technology Industry Student Name Institution Name Instructor Name Date
  • 5. The topic of modern industry as a technology industry explains how the application of modern technology has improved different organization functions. According to the ideologies of scientists, the introduction of modern technology in industries has greatly made companies to be included in the fourth industrial revolution. With reference to "Cryptosystems in Modern Industry", I selected this topic because the use of modern technology in industry has led to cryptosystems in modern industry that entail intricate association of hardware and software that assists in changing plaintext statements into a sequence of unrecognizable elements, termed as cipher text, transformed gain to their initial format. Symmetric and asymmetric cryptosystems are the mainly used cryptosystems that depend on key use and sound management actions the keys in order to ensure that they are secure. Symmetric plays the best tasks and involve the use of safe techniques for replacing keys between active members. Asymmetric system, on the other hand, does not require participants to replace keys among each other, but instead, their functioning does not require a lot of time. This means that cryptosystems play great roles in ensuring electronic communication through encryptions and computer privacy in industries (Katz & Lindell, 2014). However, with technology in modern industries, cryptosystems use the Quantum key distribution as a way of ensuring security in communication by putting in practice the cryptographic protocol. With quantum mechanism elements, communication groups can use a common secretly distributed key that is not known by the parties but it encrypts and decrypts data. The members who rely on these shared random keys can sense when
  • 6. third-party individuals are attempting to strike the key. However, application of quantum perplexity, eavesdropping can be traced through the establishment of communication program (Bitzinger, 2009). In summary, modern industry is a technology industry because cryptosystems in Modern Industry have played significant roles in ensuring organization privacy and secrecy. This is because cryptosystems are potential in ensuring industry overall data and communication security. These cryptosystem tools are strong but they always perform best when used together with other tools like firewalls, security networks, and access controls. Therefore, organizations should focus on using technology in order to advance a lot of functions, ensure speed and security in various sectors (Nick, 2018). References Nick Ismail, (2018) how modern technology is helping various industrial sectors to advance. Retrieved 26 March 2018, from
  • 7. https://www.information-age.com/modern-technology- industrial-sectors-advance-123471231/ Katz, J., & Lindell, Y. (2014) Introduction to Modern Cryptography, Second Edition. CRC Press Bitzinger, R. A. (2009). The Modern Defense Industry: Political, Economic, and Technological Issues: Political, Economic, and Technological Issues. ABC-CLIO