Wednesday, November 24, 2021

Impact of Cryptography on E-Mail l Why Email Security is important l Free Solved Assignment

 DQ 1

Impact of Cryptography on E-Mail:

Because of the difficulty of the algorithms and logic computations required, encryption is one of the finest methods for protecting data. There are alternative ways to protect data, and encryption isn't always the best option. Mathematical techniques are used to encode and decode the original material in Cryptography, a more advanced kind of encryption. In recent years, the field of cryptography has become more important. Encryption is critical in ensuring that an email's contents are only seen by the intended recipients. Users may lose their privacy if the email exchange isn't secured, and hackers may be able to get their hands on sensitive information. While companies fail to properly safeguard their customers' sensitive information when communicating with them through email, various ethical and security difficulties occur.

Companies may use encryption. It is possible to block access to confidential information over email by using encryption. This safeguards the business's privacy. Consequently, e-mailing contracts and agreements rather than meeting face-to-face is becoming more common. Unauthorized access to email messages can only be prevented by encrypting it with a strong key. According to, it is the company's obligation to ensure the security of its email exchange. A fundamental problem of encryption is that the original data is lost if the encryption key is not utilized to decode it. Due to the complexity of encryption systems and the need for constant maintenance, high processing times are a drawback. In addition, decryption is quite cheap. (Gupta et al., 2017)

The email's properties must be visible to both the recipient and the sender. Regardless of whether an email is encrypted or not, an intruder may still be able to read it if it is intercepted and accessed. An individual may get into anything with the use of a digital signature. Encrypted emails ensure that only the intended recipients may access the message's contents. Encryption and interception provide an attacker access to the contents of an email, including its whole contents. Anyone with the cryptographic signature can read the email if it isn't protected with an encryption key. Most companies have a safe system in place for their internal emails, so they should be maintained there. In other cases, the data protection officer may be worried about maintaining sensitive information on an outsourced email system or even on a company's databases. To secure their company's internal network, customers often inquire about employing an external cloud storage provider. Using encryption is the best way to protect data from unauthorized access. (Koh et al.,2017)

References:

Gupta, T., Fingler, H., Alvisi, L., & Walfish, M. (2017, August). Pretzel: Email encryption and provider-supplied functions are compatible. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication (pp. 169-182).

Koh, J. S. (2017). Mitigating Email Attacks with Usable Email Encryption.

 

No comments:

Post a Comment

Obstacles and Features of Health Information Systems: A Systematic Literature Review

Introduction In this day and age, the healthcare industry is increasingly reliant on technology. Almost all registrations, including health ...