Tuesday, May 5, 2020

Discussion on Information Technology-Free-Samples-Myassignment

Question: Discuss about the Communication and Information Technology. Answer: Encryption is a new technique which is used to covert data or information into a code. This code is not readable by normal person or third person apart from the intended receiver of the message. This helps in prevention of unauthorized access of the data (Garg et al 2016). The primary purpose of the technique is to protect confidentiality of the digital data stored in a computer system or data which is transmitted via the internet or other network in a computer system. The modern encryption algorithm plays a vital role in the security assurance of the IT system. The key elements of security achieved from the technique are authentication with which the originator of the message can be identified, integrity which ensures that the content of the message or the message is not modified or altered from the time it had been send and the non repudiation which ensures that the sender of the message cannot deny sending the message. The technique has brought about many features regarding the security aspect of confidentiality but with it different negative aspects are also being included. The messages that are sending from one person to the other are encrypted in a way that the message cannot be accessed by anyone other than the intended recipient of the message. This aspects advantage is being taken by the criminals. The criminal tend to send their conversation or their message by encrypting the message as a result of which the message cannot be accessed by any one other. As stated in a report by the FBI half of the investigation is now impeded by suspect using computer or phones with encryption (Badrinarayanan et al 2017). The negative aspect is that it would be dealing with the Privacy-protecting consumer encryption which is a technology that is almost nearly impossible to regulate or prohibit putting emphasis when criminals also use it to impede investigation. As a result of which criminals are very difficul t to be traced. The struggling had started with the Smartphone security aspect. Notably, after the ISIS inspired couple murdered 14 people (Al-Shmrani, M.A and Khan 2017). The police department tried to convince Apple to create a fake update for an iPhone to break and in order to gatherer the information from the phone. The company couldnt process the request as that would have made a huge change. Encryption has boomed its popularity in the recent months. Android devices and I phones both the devices can be encrypted if their user wants it to do so. They can create their own password or finger print in order to open the device (Badrinarayanan et al 2017). With emphasis on the different messaging application like Watsapp and iMessage strong end to end encryption is achieved which means that those devices manufacturer cant process a mean to unlock the users message (Kamp 2016). Cryptography experts resound agreed upon the fact of asking companies like Apple to a build a backdoor into an encrypted program. The benefits of encryption that is put forward for the society and the gain confidentiality access to the data need to be balanced with the opportunity presented to the criminal fraternity (Hoffman 2016). Criminals that are part of such crime are targeted by the National Criminal Intelligence Service are on a par with large organizations and use the tools in order to carry their business. Criminals are in a move to exploit and take advantage of the technology and bid out maneuver enforcement of the law. It is fact that the use of encryption is not widespread at the present time, it has created serious in different areas in order to organize crime in field of pedophilia, trafficking and terrorism. As the criminals are becoming more IT liberate the use of encryption throughout the society is increasing and crime related to it are increasing in a wide span (Boneh and Franklin 2016). Time is always a pertinent in the fight against crime. Criminals always do not wait for the law enforcement in order to finish their preparation before committing an offence or a crime epically not a serious end of the spectrum of the crime. The vital aspect is timely access to the information. The time delay when is used in order to creak an encrypted message means that the material gained is of very little use to intelligence officers or an operation team (Gross 2017). There is an old saying that if the retrieval of the black box after a crash of flight is the only evidence then why not makes the whole flight of the same material. If houses were build of an unbreakable material it would be very difficult for the police to catch the criminals knowing that the person is inside of the house. Encryption can be related to the same sort of problem (Jacobsen 2017). The data which was ones a big evidence in part of the crime in recent times the data cannot be read or is unreachable. The major issue is not to grant access to the decrypted key, but whether access to the decrypted material is available when it is lawfully required. To conclude this essay it could be stated that encryption has brought about many new advantages which can be used in order achieve confidentiality with data in the computer system or data in a mobile phone. Access to anybodies personal information and the messages cannot be accessed. These technological advantages are exploited by the criminals in order to perform their activity (Spafford 2016). The data with respect to the crime was regarded as an important evidence in order to crack the case but with the encryption technology the data can be easily accessed and the processing of the investigation is hampered. The value of the current accedes to the material that could be encrypted- emails and telecommunication- should not be underestimated in the case of fighting against serious and organized crime. The effect of the material which is made irretrievable through the use of encryption could be potentially divesting (Tian et al.2016). References Al-Shmrani, M.A. and Khan, A.R., 2017. SIMPLE IMAGE ENCRYPTION FOR MOBILE PHONES. Journal of Theoretical and Applied Information Technology, 95(5), p.1134. Badrinarayanan, S., Goyal, V., Jain, A. and Sahai, A., 2017. A note on VRFs from Verifiable Functional Encryption. IACR Cryptology ePrint Archive, 2017, p.51. Boneh, D. and Franklin, M., The Board Of Trustees Of The Leland Stanford Junior University and The Regents Of The University Of California, 2016. Systems and methods for identity-based encryption and related cryptographic techniques. U.S. Patent 9,356,779. Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A. and Waters, B., 2016. Candidate indistinguishability obfuscation and functional encryption for all circuits. SIAM Journal on Computing, 45(3), pp.882-929. Gross, S., 2017. A Mystery Wrapped in an Encryption: Surveillance and Privacy in the Encrypted Era. Nw. J. Tech. Intell. Prop., 15, pp.74-74. Hoffman, N., 2016. Review of Intercept: The Secret History of Computers and Spies by Gordon Corera. Jacobsen, K.M., 2017. Game of Phones, Data Isn't Coming: Modern Mobile Operating System Encryption and Its Chilling Effect on Law Enforcement. Geo. Wash. L. Rev., 85, p.566. Kamp, P.H., 2016. More encryption means less privacy. Queue, 14(1), p.30. Spafford, E.H., 2016. The strength of encryption. Communications of the ACM, 59(3), pp.5-5. Tian, X., Fan, C., Liu, J. and Ding, Q., 2017, August. Design and Implementation of Network Video Encryption System Based on STM32 and AES Algorithm. In International Conference on Intelligent Information Hiding and Multimedia Signal Processing (pp. 51-58). Springer, Cham.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.