Security Issues Concerning CryptosystemsStudents NameInstitu.docx
- 1. Security Issues Concerning Cryptosystems
Students Name
Institution Name
Instructor Name
Date
Introduction
In industry technology, cryptography refers to a technology that
has the power to perform significant functions in discoursing
specific forms of data susceptibility to attack.
It involves computer system security together with its operation
network safety which functions towards accomplishing common
subjects.
Cryptography in the technology industry is used to secret
information from attack by unofficial groups, mostly during the
exchange of information through entities when it is most
unprotected to interception (Deb, 2007) .
It ensure that data is secure and confidential to all activities in
the technology industry.
2
Security Threats To Technology Industry
Some of the common security threats in the technology industry
include;
Privilege escalation which entails structured software activities
that in many times have problems that can be exploited and
have the power to access data significantly from sites protected
from unauthorized users or applications and cause damages.
A virus is the other threat which involves computer software
which has the power to copy and cause problems to other
- 2. devices.
The trojan threat also known as Trojan horses are structured
activities that aim at authorizing hidden hackers to enter into a
computer and affect services and cause data issues Veronica
(Henry,2010) .
The bugs in the privilege escalation threat act by tolerating
approach to specific resources with significant rights that can
avoid security measures.
The virus threat is transferred via interconnected networks or
sharing devices like USB and portable means.
The main role of adware is to improve the focus on the
demonstration of web advertisements.
3
Cont,
Spyware is a threat that can enter into a computer device via
downloaded software and collect significant user data by tracing
the internet functions and transferring that to attacking
components.
Adware is a threat that functions just like spyware by
monitoring individuals activities in a computer through internet
scanning actions.
Impacts of security threats
In the technology industry the threats mentioned above have led
to impacts like;
Social media attacks where social attackers are influencing
social platforms as a way to spread risks known as water holing.
They also cause a lack of encryption which is essential for
guarding confidential data.
The threats also cause outdated security software making them
unable to prevent information from attacks.
They also cause inadequate security technology with weak
- 3. security.
Countermeasure
Some of the fundamental countermeasures the technology
industry uses include;
Ensuring strong password management
Employing firm security guards
Applying access management around an operating system
The sector also involves the implementation of important
input/output systems known as BIOS password
Additionally, it also offers security awareness training sessions
to ensure that all workers have sufficient knowledge (Michael,
2010)
The term countermeasure delegate to a procedure or practised
used by organizations to stop security threats.
6
Conclusion
In summary, cryptosystems are useful pieces of equipment when
used in the technology industry because they have the power to
provide security and confidentiality to information. For
example, they guard the industry data and ensure safety to all
communications. Nevertheless, modern industries should target
at utilizing the systems to improve their activities and privacy
in different areas.
References
Veronica Henry. (2010) Top 10 Security Threats Every IT Pro
Should Know | Pluralsight. Retrieved May 6, 2010, from
https://www.pluralsight.com/blog/it-ops/top-10-security-threats
Deb Shinder . (2007) News, Tips, and Advice for Technology
Professionals - TechRepublic. Retrieved July 16, 2007, from
- 5. The topic of modern industry as a technology industry explains
how the application of modern technology has improved
different organization functions. According to the ideologies of
scientists, the introduction of modern technology in industries
has greatly made companies to be included in the fourth
industrial revolution. With reference to "Cryptosystems in
Modern Industry", I selected this topic because the use of
modern technology in industry has led to cryptosystems in
modern industry that entail intricate association of hardware
and software that assists in changing plaintext statements into a
sequence of unrecognizable elements, termed as cipher text,
transformed gain to their initial format. Symmetric and
asymmetric cryptosystems are the mainly used cryptosystems
that depend on key use and sound management actions the keys
in order to ensure that they are secure. Symmetric plays the best
tasks and involve the use of safe techniques for replacing keys
between active members. Asymmetric system, on the other
hand, does not require participants to replace keys among each
other, but instead, their functioning does not require a lot of
time. This means that cryptosystems play great roles in ensuring
electronic communication through encryptions and computer
privacy in industries (Katz & Lindell, 2014).
However, with technology in modern industries, cryptosystems
use the Quantum key distribution as a way of ensuring security
in communication by putting in practice the cryptographic
protocol. With quantum mechanism elements, communication
groups can use a common secretly distributed key that is not
known by the parties but it encrypts and decrypts data. The
members who rely on these shared random keys can sense when
- 6. third-party individuals are attempting to strike the key.
However, application of quantum perplexity, eavesdropping can
be traced through the establishment of communication program
(Bitzinger, 2009). In summary, modern industry is a technology
industry because cryptosystems in Modern Industry have played
significant roles in ensuring organization privacy and secrecy.
This is because cryptosystems are potential in ensuring industry
overall data and communication security. These cryptosystem
tools are strong but they always perform best when used
together with other tools like firewalls, security networks, and
access controls. Therefore, organizations should focus on using
technology in order to advance a lot of functions, ensure speed
and security in various sectors (Nick, 2018).
References
Nick Ismail, (2018) how modern technology is helping various
industrial sectors to advance. Retrieved 26 March 2018, from