Top Banner
Encryption and Case study on Data Protection BY: Dheeraj Srinath
15
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Encryption

Encryptionand

Case study on Data Protection

BY:Dheeraj Srinath

Page 2: Encryption

Encryption

Page 3: Encryption

What is encryption?

• A process that converts original information, also called plain text into a difficult-to-interpret form called cipher text.

• Done by using an encryption algorithm, a formula used to turn plain text into cipher text.

• Two types: Asymmetric and Symmetric

Page 4: Encryption

History• Classic cryptography

o Used to create mysteryo Used first by Julies creaser

• Medieval cryptography• Period till 1800 AD.• Arabs were the first to document cryptographic techniques

• 1800 to World War IIo Widely used in World War I

• World War IIo Mechanical machineso Enigma

• Modern cryptographyo Use of computer algorithms

Page 5: Encryption

Encryption Process

Page 6: Encryption

Hash Function• Hash functions are primarily used to

generate fixed-length output data that acts as a shortened reference to the original data

• Input : Message of any length• Output: fixed length string called message digest• Used to verify the authenticity of data.• Most widely used are MD5, SHA1.

Page 7: Encryption

Algorithms• Private key/ Synchronous

o DESo AES

• Public Key/ Asynchronouso RSA

• Hashingo MD5o SHA1

Page 8: Encryption

Advantages• Privacy and protection.• Identity Theft Prevention• Unauthorised Access Protection• Compliance with Data Protection Acts• Prevention from hackers• Helps move data to the cloud• Prevent service providers from accessing

your data

Page 9: Encryption

Disadvantages• Key management.• Loss of key could lead to permanent loss

of data• Time consuming• Complex• Software's are not always trustworthy

Page 10: Encryption

Data ProtectionCase Study

Page 11: Encryption

Threats to Data• Loss or damage due to a system CRASH• Data getting corrupted as a result of faulty disks,

disk drives, or power failures• Loss by accidental deletion or overwriting• Attack by VIRUS.• HACKED into by unauthorised users and deleted

or altered• Destroyed by natural disasters, acts of terrorism,

or war• Deleted or altered by employees wishing to make

money or take revenge on their employer.

Page 12: Encryption

Protection plan

• Multiple Copies of Data• Keep one copy of data on the cloud• Make sure the copies are encrypted• Keep encryption key separately • Use firewall and antivirus• Keep all sensitive on a stand alone PC• Keep a copy on a stand-alone system• Maintain a hash table of files

Page 13: Encryption

Conclusion• Encryption is not only required

but it is the only way out for protecting the data.

Page 14: Encryption
Page 15: Encryption