advantages of confidential data storage and deletion
#1

Advantages of confidential data storage and deletion[/size]
Reply
#2

advantages of confidential data storage and deletion

Abstract
With the decrease in cost of electronic storage media, more and more sensitive data gets stored in those media. Laptop computers regularly go missing, either because they are lost or because they are stolen.

These laptops contain confidential information, in the form of documents, presentations, emails, cached data, and network access credentials. This confidential information is typically far more valuable than the laptop hardware, if it reaches right people. There are two major aspects to safeguard the privacy of data on these storage media/laptops. First, data must be stored in a confidential manner. Second, we must make sure that confidential data once deleted can no longer be restored.

Various methods exist to store confidential data such as encryption programs, encryption file system etc. Microsoft BitLocker Drive Encryption provides encryption for hard disk volume and is available with Windows Vista Ultimate and Enterprise editions. This seminar describes the most commonly used encryption algorithm, Advanced Encryption System (AES) which is used for many of the confidential data storage methods. This seminar also describes some of the confidential data erasure methods such as physical destruction, data overwriting methods and Key erasure.

Traditional methods for protecting confidential information rely on upholding system integrity. If a computer is safe from hackers and malicious software (malware), then so is its data. Ensuring integrity in today’s interconnected world, however, is exceedingly difficult. There are two major components to safeguard the privacy of data on electronic storage media. First, the data must be stored confidentially without incurring much inconvenience during normal use. Second, data must be removed from the storage medium in an irrecoverable manner, at the time of disposal

Introduction
The general concept of secure handling of data is composed of three aspects: confidentiality, integrity, and availability. Confidentiality involves ensuring that information is not read by unauthorized persons. Using encryption to store data or authenticating valid users are examples of means by which confidentiality is achieved. Integrity ensures that the information is not altered by unauthorized persons. Storing a message authentication code or a digital signature computed on encrypted data is a way to verify integrity. Finally, availability ensures that data is accessible when needed. Having multiple servers withstand a malicious shutdown of a server is one way to improve availability.

Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The unreadable text created is known as cipher text. The reverse process is known as decryption. There are two basic techniques for encrypting information: symmetric encryption (also called secret key encryption) and asymmetric encryption (also called public key encryption). Symmetric encryption is the oldest and best-known technique. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the content in a particular way. This might be as simple as shifting each letter by a number of places in the alphabet. As long as both sender and recipient know the secret key, they can encrypt and decrypt all messages that use this key.

The problem with secret keys is exchanging them over the Internet or a large network while preventing them from falling into the wrong hands. Anyone who knows the secret key can decrypt the message. One answer is asymmetric encryption, in which there are two related keys-a key pair. A public key is made freely available to anyone who might want to send you a message. A second, private key is kept secret, so that only you know it. Any message (text, binary files, or documents) that are encrypted by using the public key can only be decrypted by applying the same algorithm, but by using the matching private key. Any message that is encrypted by using the private key can only be decrypted by using the matching public key. Here, we do not have to worry about passing public keys over the Internet (the keys are supposed to be public). A problem with asymmetric encryption, however, is that it is slower than symmetric encryption. It requires far more processing power to both encrypt and decrypt the content of the message.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: advantages of data storing on fingernail,
Popular Searches: data storage on fingernail advantages, advantages of confidential data storage and deletion, advantages of confidential data storage,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  data flow diagram for whatsapp 2 4,184 09-12-2018, 02:30 PM
Last Post: Rhysevans371a
  A New Data Mining Based Network Intrusion Detection Model prem0597 2 4,224 04-05-2018, 09:42 PM
Last Post: Guest
  5d data storage technology ppt 2 1,609 01-12-2017, 09:43 PM
Last Post: Ajaykc
Thumbs Up online catering management system on php with report and source code and ppt 4 8,716 29-04-2017, 10:59 AM
Last Post: jaseela123d
  vodacom cheat codes unlimited data bundles 3 1,441 01-03-2017, 04:35 PM
Last Post: jaseela123d
Wink uml diagram for privacy preserving public auditing for secure cloud storage 2 1,001 19-09-2016, 10:20 PM
Last Post: harikash
  hack my cell c sim to unlimited data 2 1,552 25-08-2016, 09:55 PM
Last Post: Guest
  vodacom free data bundles cheat code 3 1,488 04-08-2016, 04:01 PM
Last Post: dhanabhagya
  advantages of using this nanochemicals 2 991 21-07-2016, 04:19 PM
Last Post: jaseela123d
  advantages disadvantages of arduino automatic plant watering system 2 982 21-07-2016, 03:24 PM
Last Post: dhanabhagya

Forum Jump: