We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Data Transmitted over a Network Can Be Protected by Encryption

essay
The whole doc is available only for registered users
  • Pages: 3
  • Word count: 591
  • Category: Internet

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

Below, I will explain the way that data transmitted over a network can be encrypted to provide protection. I will explain what encryption entails, how data is transmitted, and why it is important to encrypt private data to ensure its protection. What Does Encryption Entail and How Does It Work?

Encryption entails rearranging data in such a way that only the owner of both the encryption and decryption key can understand. It serves the purpose of passing information over networks in a “secret” form so that it cannot be interrupted by hackers who may wish to view the communications for malicious reasons. Encryption is extremely important for e-commerce as it allows confidential information such as credit and debit card details to be sent safely to the online business which is receiving these details. Web browsers are able to encrypt purchase details using an encryption method known as SSL (Secure Socket Layer). SSL is switched on when a user visits a secure server site which begins with HTTPS (Secure HyperText Protocol). Encryption works by scrambling the original message with a very large digital number (key). This is done using advanced mathematics. Commercial level encryption uses 128-bit key that is very difficult to crack, even whilst using advanced software. The computer receiving the message understands and recognises the digital key; therefore, it is able to comprehend the intended message. There are three major drawbacks to encryption:

1. It is slower than normal browsing. It can sometimes take quite a while for the browser to carry out the required maths to encrypt the message, and another delay on the receiving server may follow as it decrypts the data. 2. Online shops need to have a digital certificate that contains part of the required key. This is not free as must be supplied to them by a “certificate authority”. 3. Running a secure server can be complicated so a lot of online stores will hire a specialist Payment Gateway like PayPal to handle payments for them. DRM (Digital Rights Management) is used to encrypt downloaded music, and to copy-protect DVDs.

How Is Encrypted Data Transmitted
All application data transmitted to and from the client browser can be encrypted using the web server’s built-in SSL (secure socket layer) encryption. This standard security ensures that no one can see your data as it passes over the public Internet or over your private intranet and local area networks.

Why Is It Important To Encrypt Data To Ensure Protection?
Sending data through the internet has an increasingly high risk of being hacked. Because the number of hackers is increasing day to day, and these hackers are so efficient in their job, they can easily hack any unencrypted data. If this hacked data contains any personal details then this data can easily be misused in malicious ways. Any time data is sent over the internet, it can easily be viewed by others who wish to view it. It is important to encrypt data so that any private information you wish to transfer will be kept safe and, most importantly, private. Data is sent along a variety of routes to reach the ISP it is destined for, and if data is unencrypted it can be hacked along any of these pathways. Many large companies will use VPNs to ensure that any business details they send over networks will be protected. Encryption is important as it ensures that hackers cannot enter the network without authorization, and it also ensures that the networks shared are both safe and reliable.

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59