Computer Security Encryption - Computer Security

What is Encryption?

  • Encryption is the most effective way to achieve data security.
  • Encrypted data is referred to as cipher text.
  • Encryption may be used for good or bad purposes.
  • If somebody has access to these files they would still not be able to understand the message in it. Only authorized persons can read it. Since the ancient times encryption is used.

For example, the pigeon couriers, where the kings used to send messages to their commandants in the battle field in a specific code, which can be decrypted only when it is arrived at the destination commandant that had the decryption vocabulary. When the enemies caught them, they could not read them, seems as if the message was lost.

Computer Security Encryption

There also a bad case in this scenario in which most of the malware files are in an encrypted form, so it cannot be read by everyone accept the hacker.

Tools Used to Encrypt Documents

The tools that we use to encrypt documents:

  • Axcrypt:This is best open source encryption file software. It can be used in Windows OS, Mac OS and Linux as well. This software can be downloaded from www.axantum.com/AxCrypt/Downloads.aspx
  • GnuPG: It is an open source software and it can be integrated with other software too (like email). It can be downloaded from www.gnupg.org/download/index.html
  • Windows BitLocker: It is a Windows integrated tool and its functions is to secure and encrypt all the hard disk volumes.
  • FileVault: This is a Mac OS integrated tool and it helps to secures as well as encrypts all the hard disk volume.

Encryption Ways of Communication

The SSL (Secure Sockets Layer) is used by the System Administrators to offer their staff a secure and encrypted channel of communication. This SSL helps to establish a secure and encrypted connection between the clients and the servers.It is used for Web Servers, Mail Servers, FTP servers.

Why do you need this?

When we do online shopping, we use credit card and personal data for online payment. But the data can be stolen by a simple wiretapping as the communication is in clear text, to prevent this, SSL Protocol is used to encrypt this communication.

How to see if the communication is secure?

When browsers have a lock icon or a green bar, then the visitors know that the connection is secured. An example is shown in the following screenshot.

Secure Communication


The SSH (Secure Shell) is another tool used by system administrator to secure replacement for the telnet and other unencrypted utilities like rlogin, rcp, rsh.

A secure channel encrypted in the communication host to host over internet is provided and reduces the man-in-the-middle attacks. It can be downloaded fromwww.putty.org/

Secure channel encrypted

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status

Computer Security Topics