Start networking and exchanging professional insights

Register now or log in to join your professional community.

Follow

What is Data Encryption? and how it's useful ?

user-image
Question added by Mohammed Yaseen MBA PMP® , Project Controller , Hayat Communication (www.haytacommunications.com)
Date Posted: 2014/01/29
Mohammed Yaseen MBA  PMP®
by Mohammed Yaseen MBA PMP® , Project Controller , Hayat Communication (www.haytacommunications.com)

Data encryption is the act of changing electronic information into an unreadable state by using algorithms or ciphers. Originally, data encryption was used for passing government and military information electronically. Over time as the public has begun to enter and transmit personal, sensitive information over the internet, data encryption has become more widespread. Nowadays web browsers will automatically encrypt text when connecting to a secure server. You can tell you are on a secure, encrypted website when the URL begins with "https", meaning Hypertext Transmission Protocol, Secure.

What is considered sensitive data? Whenever you enter sensitive data on the internet you want to make sure you are on secure website that encrypts the information. Some sensitive data you should make sure you are entering on a secure, encrypted website are:
  • Full name
  • Social Security Number
  • Credit and Debit card numbers
  • Billing and shipping addresses
  • Bank account and bank account log in information
  • Financial/salary information
  • Driver's license number
  • Date of birth
  • Health and patient information
  • Student information
  • Ensuring that you use data encryption software or use a secure website beginning with "https" when you enter personal, sensitive data will help prevent identity theft.

SALAHEDDIN SHTEWI
by SALAHEDDIN SHTEWI , محاضر , كلية طرابلس لتقنية الحاسوب

 data encryption is the acts and efforts taken to convert the understandable information to unintelligible form of bytes or bits

 

encryption use to protect :

 

confidentiality:  by (symmetric algorithms , asymmetric algorithms)

integrity : by one way encryption function (hash function )

non repudiation  : by digital signature (private key )

More Questions Like This

Do you need help in adding the right keywords to your CV? Let our CV writing experts help you.