Reliability, Integrity and Potentially compromising System Security.
MUHAMMAD AZEEM QURESHI
Contact Centers : Workforce Management and Quality Optimization Specialist
WINE sips of word,?SECURITY:
If you want to study and understand the true meaning of?the world's most powerful English word?"SECURITY"?then research and translate it into all languages of the world and recite/read it in the Roman English alphabet, trust me it will give you complete comprehension and understanding as per the default languages already brim up in your mind as my mind has ENGLISH and URDU.
For example, we say?"SECURITY"?in Sanskrit by following words:
saMrakSaNa, pAribhAvya, surakSA, nirupadravatA, aditi, nirApad, ariSTatAti, rakSA, ariSTi, ahiMsA, RNamArgaNa, pratibhU, vinimaya, kSema, pAribhAvya, abhaya, nirbhaya
The below link will lead you to enjoy researching the extremely high-level taste of WINE has filled with the perceptivity of intellectuals and intelligibility. (How to say?"SECURITY"?in Different Languages)
The content credit of this article goes to the book on "A Practical Guide to Red Hat Linux 8" written by Dr. Helen L. Sobell, published in New Dehli India with Addison-Wesley/Pearson Education Inc, USA.
Security is the major part of the foundation of any system that is not totally cur off from other machines and users. Some aspects of security have a place even on isolated machines. Examples are periodic system backups, BIOS or power-on passwords, and self-locking screensavers.
A system that is connected to the out side world requires other mechanisms to secure it: tools to check files (tripwire), audit tools (tiger/cops), secure access methods (kerberos/ssh), services that monitor logs and machine states (swatch/watcher), packet-filtering and routing tools (ipfwadm/iptables/ipchains), and more.
System security has many dimensions. The security of your system as a whole depends on the security of indivisual componenets, such as your e-mail, files, network, login and remote access policies, as well as the physical security of the host itself.
These dimensions frequently overlap, and thier borders are not always static or clear. For instance, e-mail security is affected by the security of files and your network. If the medium (the network) over work which you send and recive your e-mail is not secure, you muyst take extra steps to ensure the security f your messages. If you save your secure e-mail into a file on your local system, you rely on the filesystem and host access policies for the file security.
A failure in any one of these areas can start a domino effect, diminishing reliability and integrity in other areas and potentially compromising system security as a whole. This short appendix cannot cover all the facets of system security but does provide an overview of the complexity of setting up and maintaining a secure system. This appendix provides some specifics, concepts, guidelines to consider, and many pointer to security resources.
ENCRYPTION:
One of the building blocks of the security is encryption, which provides a means of scrambling data for secure transmission to other parties. In cryptographic terms, the data or message to be encrypted is referred to as plaintext, and the resulting encrypted block of text as ciphertest.
A number of processes exist for converitng plaintext into ciphertext through the use of keys, which are essentially random numbers of a specified length used to lock and unlock data. This conversion is achieved by applying the keys to the plaintext by following a set of mathematical instructions, referred to as the encryption algorithm.
An encryption algorithm uses a key that is certain number of bits long. Each bit you add to the length of a key effectively doubles the key space (the number of combinations allowed by the number of bits in the key - to the power of the length of the key in bits) and means that it will take twice as long for an attacker to decrypt your message (assuming that there are no inherent weaknesses or vulnerabilities to exploit in the scheme).
However, it is mistake to compare algoriths based only on the number of bits used. An Algorithm that uses a 64-bit key can be more secure than an algorithm that uses a 128-bit key.
The two primary classifications of encryption schemes are public key encrption and symmetric key incryption. Public key encryption, also called asymmetric encryption, uses two keys: a public key and a private key; these keys are uniquly symmetric encryption, or secret key encryption, uses one key that you and the person you are communicating with (hereafter, referred to as your friend) share as a secret. Public key algorithms use keys in the range of 64-bits to 512 bits.
When you are choosing an encryption scheme, realize that security comes at a price. There is usually a trade-off between resilience of the cryptosystem and ease of administration. The practicality of a security solution is a far greater factor in encryption, and in security in general, than most people realize. With enough time and effort, nearly every algorithm can be broken. In fact, you can often unearth the mathematical instructions for a widely used algorithm by flipping through a cryptography book, reviewing a vendor's product specifications, or performaing a quick search on the internet. The challenge is to ensure that the efoort required to follow the tweists and turns taken by an encrytpion algorithm and its resulting encryption solution out weighs the worth of the infomration it is protecting.
Public key encryption (Content Credit: MEET BARD Google AI)
Public key encryption (also known as asymmetric cryptography) is a cryptographic system that uses pairs of keys: public keys which may be distributed openly, and private keys which are kept secret. Public keys are used to encrypt data, while private keys can be used to decrypt the encrypted data. This allows anyone to encrypt data for a specific recipient, but only the recipient with the corresponding private key can decrypt it.
Public key encryption is based on the concept of a one-way function. A one-way function is a mathematical function that is easy to compute in one direction, but very difficult to compute in the reverse direction. For example, it is easy to multiply two large prime numbers together, but very difficult to factor a large number into its prime factors.
Public key encryption systems use one-way functions to create public and private keys. The public key is used to encrypt data, while the private key is used to decrypt it. The public key can be distributed openly, while the private key must be kept secret.
Here are some of the most common public key encryption algorithms:
领英推荐
Public key encryption is used in a variety of applications, including:
Public key encryption is a powerful tool that can be used to protect sensitive data. It is an essential part of modern security infrastructure.
Here are some of the benefits of using public key encryption:
Public key encryption is a powerful tool that can be used to protect sensitive data. It is an essential part of modern security infrastructure.
Here are some of the challenges of using public key encryption:
Despite the challenges, public key encryption is a valuable tool that can be used to protect sensitive data. It is an essential part of modern security infrastructure.
Symmetric key encryption is a cryptographic method of protecting data by transforming it (encrypting it) using a secret key, then transforming it back (decrypting it) using the same key. This process is known as a symmetric encryption algorithm, or simply a symmetric cipher.
Symmetric key encryption is the most common form of encryption. It is used in a wide variety of applications, including:
Symmetric key encryption (Content Credit: MEET BARD Google AI)
Symmetric key encryption is a simple and efficient way to protect data. It is relatively easy to implement and can be very fast. However, symmetric key encryption has one major drawback: the key must be shared between the sender and receiver of the encrypted data. This can be a challenge, especially if the sender and receiver do not know each other or if they are located in different parts of the world.
To address this challenge, symmetric key encryption is often used in conjunction with asymmetric key encryption. Asymmetric key encryption uses a pair of keys, a public key and a private key. The public key can be shared with anyone, while the private key must be kept secret. This allows the sender to encrypt data using the recipient's public key, and the recipient to decrypt the data using their private key.
The combination of symmetric key encryption and asymmetric key encryption is known as a hybrid cryptosystem. Hybrid cryptosystems offer the best of both worlds: the speed and efficiency of symmetric key encryption, and the security of asymmetric key encryption.
Here are some of the most common symmetric key encryption algorithms:
Here are some of the benefits of using symmetric key encryption:
Here are some of the challenges of using symmetric key encryption:
Despite the challenges, symmetric key encryption is a valuable tool that can be used to protect sensitive data. It is an essential part of modern security infrastructure.
Thanks,
With Love and Sincerity,
Contact Center Workforce Management and Quality Optimization Specialist.