and
Case study on Data Protection
BY:
Dheeraj Srinath
Encryption
What is encryption?
A process that converts original
information, also called plain text into a
difficult-to-interpret form called cipher
text.
Done by using an encryption algorithm, a
formula used to turn plain text into cipher
text.
Two types: Asymmetric and Symmetric
History
Classic cryptography
o Used to create mystery
o Used first by Julies creaser
Medieval cryptography
World War II
o Mechanical machines
o Enigma
Modern cryptography
o Use of computer algorithms
Encryption Process
Hash Function
Hash functions are primarily used to
generatefixed-length output datathat acts as
a shortened reference to the original data
Input : Message of any length
Output: fixed length string called message digest
Used to verify the authenticity of data.
Most widely used are MD5, SHA1.
Algorithms
Private key/ Synchronous
o DES
o AES
Hashing
o MD5
o SHA1
Advantages
Disadvantages
Key management.
Loss of key could lead to permanent loss
of data
Time consuming
Complex
Software's are not always trustworthy
Data Protection
Case Study
Threats to Data
Loss or damage due to a systemCRASH
Data getting corrupted as a result of faulty disks,
disk drives, or power failures
Loss by accidental deletion or overwriting
Attack by VIRUS.
HACKEDinto by unauthorised users and deleted
or altered
Destroyed by natural disasters, acts of terrorism,
or war
Deleted or altered by employees wishing to make
money or take revenge on their employer.
Protection plan
Conclusion
Encryption is not only required
but it is the only way out for
protecting the data.