Essay on Data Security and Encryption

Introduction

Data security and encryption are important in maintaining data on information systems. If properly implemented, data security and encryption processes may improve the level of assurance to users. Data security strategies in a system are effective in ensuring that unauthorized persons do not view vital data. Therefore, security measures and encryption strategies are effective in preventing interception of data, theft and view by unauthorized persons. In respect to data security, it is imperative to note that it relates to a range of measures in protecting databases (Pfleeger, and Shari, 2002). This type of security also values protection of servers, stored functions. The potential threats to databases include unauthorized transactions on servers by administrators. Another influence relates to infections by malware, overloads, programming and design flaws and physical damage.

Encryption on the other hand relates to the process of encoding messages. This process of encoding is important in a system since it ensures that only authorized individuals view the message. Diverse software has been effective in encrypting data. The methods of encryption of data include symmetric key encryption technique. The other method relates to the application of public key encryption. However, for a system to function properly such measures is of great importance. Military organizations use such measures in transmitting secret information. For the civilian populations such measure ensures verification of messages (Pfleeger, and Shari, 2002). To make it a success, the use of digital signature and message authentication codes is of importance. In order to attain an effective data security and encryption, various activities are necessary.

Need an essay assistance?

Our professional writers are here to help you.

PLACE AN ORDER

Mandatory Access Control

Mandatory access control is a process in which the operating system is programmed to limit the access of subjects on the system. The designers of such systems ensure that initiators or subjects are unable to access the general performance of the database. Mandatory access control works in a fantastic fashion. The process of its functions depends on the Kernel of the system. In practice if one wishes to access the system, an authorization process is necessary. For one to access the system the Kernel examines the request of the user then a rule enforced on the system takes place.

The rule has security attributes that process users requests; either rejecting or accepting it (Kuhn, Xie, and Hwang, 2011). Various fronts on the field have been in practice in many corporations. For example, MAC computers have been effective in using Multi-level security systems. Trusted Computer systems Evaluation Criteria is another important invention. Other innovations on the front include TOMOYO Linux, Gsecurity and SUSE Linux. Maybe the innovation of application has made security an important feature. Trusted Mandatory Access controls have been a feature for ipad, iphone as well as other fronts. Such aspects include SELinux, MAC Os and FLASK fronts (Sun et al 2009).

Discretionary Access Control

Unless Mandatory Access control is in use, Discretionary Access may be effective. However, for Discretionary control to take place, Trusted Computer Evaluation Criteria needs to be implemented (Popa et al 2012). This type of control ensures that individual’s restriction to accessing the system bases on their allegiances. Their allegiances may be in form of a group or certain subjects. In this type of security, the control is discretionary. This means that an individual has permission to access the database. On the other hand, the user of the system may share this permission with other individuals. Discretionary Access control ensures that a user has ultimate control of programs and files (Fong, 2008). The user might decide to provide permission to other users as well as prohibit others. This type of control on the other hand refers to the provision of access to those who need it.

Role-Based Access Control

Role- Based access control revolves around use of Mandatory access control as well as discretionary control. When one visits huge corporation that feature over 400 workers, it becomes apparent that role based Access control is essential. Role based system Access control uses the properties of the discretionary as well as Mandatory Access controls (Zhang and Yang, 2003). The feature ensures that access permission has its hierarchy (Galante, 2009). In an organization, subjects might have specific permission in accessing the system. On the other hand, assignment of such permission of access might require authorization from specific individuals. Such permissions

Our Advantages

Quality Work

Unlimited Revisions

Affordable Pricing

24/7 Support

Fast Delivery

Order Now

Custom Written Papers at a bargain