Wednesday, December 11, 2019

English Language and Linguistic Business Media

Question: Discuss about theEnglish Language and Linguistic for Business Media. Answer: Introduction: The article of Schneier has provided an in-depth overview about the importance of encryption in order to keep a constant protection in technological devices. Encryption is a systematic procedure of encoding messages based on which an authorized party can read the message only. Various government and non-governmental organizations can keep their confidential data and information by using encryption. Journalists are able to communicate with the secured sources with the help of encryption. As per the point of view of Schneie, encryption can be considered as one of the most essential components of security. To some extent, it is undeniable that Encryption renders a major security in the devises. As a result, people can keep their secured data within their device easily. Daemen Rijmen, (2013) stated that innumerable criminal investigations have been conducted by using encryption in order to maintain confidentiality in their data. Strong encryption is always unbreakable. Criminals, hackers would never be able to leak data. The article of Schneie has been differed strongly by many scholars. As per the point of view of Rayarikar, Upadhyay Pimpale, (2012), encrypted files need an appropriate password. If the user forgets the password by chance, the entire file would be demolished because an unauthorized person cannot open encrypted file. Encrypted file raise suspicion among the people in general. If a user likes to use encrypted file at the workplace, it may raise a suspicion for the other people. Therefore, the people around them tend to become violent in order to break the confidentialit y of data. On the other hand, Libert, Paterson Quaglia, (2012) opined that encryption is only fruitful for a single user. If two or more than two people intend to become involve within a single project they have to face immense challenges in order to operate the same device. However, the strength of this particular article is that Schneie has highlighted a deep insight about the essence of encryption. Schneie has discussed in detail on how encryption helps to maintain confidentially of data. The journalists, criminal investigators, bankers for maintaining online transactions are highly benefited and facilitated by using data encryption software. Schneie has highlighted the utilization of encryption in detail. At the same time, this specific article is not devoid of some of its major weaknesses as well. The author does not intend to mention the various ways of using encryption software and its risk factors (Talha Barry, 2013). Before using an encrypted file people should know the utilization of this software and its risk analysis. The entire study deals with the point of view of Schneie regarding the value of encryption for maintaining confidentiality of technological devices. Based on this article different scholars have expressed their point of view. Some of the disadvantages of encryption software have also been highlighted in this particular study. As per the critical analysis of the article of Schneie it can be evaluated that encryption helps to keep confidential data safe and secured. Therefore, user should know the process of using encryption. Reference List: Daemen, J., Rijmen, V. (2013).The design of Rijndael: AES-the advanced encryption standard. Springer Science Business Media. Rayarikar, R., Upadhyay, S., Pimpale, P. (2012). SMS encryption using AES Algorithm on Android.International Journal of Computer Applications,50(19). Libert, B., Paterson, K. G., Quaglia, E. A. (2012, May). Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model. InInternational Workshop on Public Key Cryptography(pp. 206-224). Springer Berlin Heidelberg. Talha, S. K., Barry, B. I. (2013, August). Evaluating the impact of AES encryption algorithm on Voice over Internet Protocol (VoIP) systems. InComputing, Electrical and Electronics Engineering (ICCEEE), 2013 International Conference on(pp. 686-691). IEEE.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.