Anda di halaman 1dari 3

Mata Kuliah

: Sistem Informasi

Akuntansi
Nama Dosen

: Diena Noviarini

Nama Mahasiswa : Ratna Kemala


No. Registrasi
Kelas

: 8335123490

: S1 Akuntansi Reguler A

Encryption
Questions :
1. why would a business want to use encryption?
2. when would it be useful to set up dual key encryption for email?
3. in a typical company, which drives should use drive-level encryption?
Answer :
1. Encryption means scrambling data into a secret code that cannot be deciphered
except by the intended party. Given enough time and computing power, all encrypted
messages can be read, but this can take huge amounts of time and resources. In
simple terms, encryption is a way for us to secure your files and emails from spying
eyes. Our files get translated into code an apparently random collection of numbers
and letters - that makes no sense to anyone who sees it. To encrypt a file, you "lock" it
with a key, represented by a pass phrase. To encrypt a message, you lock it with a key
pair using your pass phrase. It can only be opened by the intended recipient, using his
or her own pass phrase.
Everyone should use encryption, because digital communications are inherently
unsafe. However, human rights workers are much more at risk than most people and
their files and communications are more sensitive. It is imperative for human rights
workers to use encryption to protect themselves and the people they are trying to
help. Digital technology is a benefit to human rights groups, allowing them easier
communications, greater efficiency and more opportunities. However, with any
benefits come certain dangers. Just because you wear a seat belt doesnt mean you are

expected to have an accident every time you drive. Driving in a more dangerous
situation, such as a race, makes you even more likely to use a seatbelt, just to be safe.
Human rights workers are known targets of surveillance. Since unencrypted emails
can be accessed and read by almost anyone, it is almost inevitable that your
unencrypted emails will be accessed at some point. Your messages may already be
monitored by your opponents and you will never know. The opponents of people you
are working to help are also your opponents. For example, when your data is in
transit, it is encrypted as data moves between you and the datacenter and between the
server and the datacenter, which uses 2048 bit keys. However, the encryption
technology applies not only when the data is moving between servers or datacenters,
but also when the data is at rest. When data is at rest there are two types of encryption
that are used: Disk encryption and File encryption. At the disk encryption level,
BitLocker is used to secure data and at the file encryption level, every file is secured
with its own key that uses Advanced Encryption Standard (AES) with 256-bit keys
and is Federal Information Processing Standard (FIPS) 140-2 compliant. For
businesses, there may be various commercial guidelines or rules requiring the use of
encryption. These are intended to prevent the terrible stories we hear about business
laptops being stolen out of cars, and those laptops having massive databases
containing millions of customer credit card numbers on them. Of course this sort of
data should be encrypted.
2. Dual key encryption in which two different keys encrypt the data simultaneously,
one being the regular key and the other being the time of key entry. The encryption
process uses conventional encryption methods with some modifications to increase
the security but the decryption process is accomplished by checking both the validity
of the key and the relative times the keys are entered into the system. This overcomes
the fact that the brute force attack fully depends on the speed of the system used for
cryptanalysis as the time interval between two successive key entries also consumes
time. If you really want to communicate privately and securely, youll want to handle
the email encryption.

3. SED. An SED is a self-encrypting hard drive with a circuit built into the disk
drive controller chip that encrypts all data to the magnetic media and decrypts all
the data from the media automatically. All SEDs encrypt all the time from the
factory onwards, performing like any other hard drive, with the encryption being
completely transparent or invisible to the user.The encryption key used in SEDs is
called the Media Encryption Key (MEK). Locking and unlocking a drive requires
another key, called the Key Encryption Key (KEK) supplied by the user (or the
platform, or the network).SEDs are one of the information security industry's best
kept secrets. They solve many common data loss problems, are easy to use and
manage with minimal impact on system performance. Yet relatively few
businesses and governments use SEDs, according to Robert Thibadeau, who
assembled the original team at disk-maker Seagate, the company that pioneered
SED technology.

Anda mungkin juga menyukai