Data encryption is nothing but translation of data into secret code. It is the most effective way to achieve data security, encrypted files can be read by a secret key or password which enables it to decrypt it. Data which is unencrypted is called as plain text and encrypted data is referred as cipher text.
Encryption is divided into two types.
- Symmetric encryption:
Symmetric key encryption uses same key to encrypt and decrypt data, it is faster than public key but needs to store securely and is required only when we access it. Symmetric cryptography, also called private-key cryptography, is one of the oldest and most secure encryption methods. The term “private key” comes from the fact that the key used to encrypt and decrypt data must remain secure because anyone with access can change and read the coded messages. A sender encodes a message into cipher text using a key, and the receiver uses the same key to decode it.
- 2. Asymmetric:
Asymmetric is more secure than symmetric methods of encryption it is also known as public key encryption. This type of cryptography uses two keys, a “private” key and a “public key,” to perform encryption and decryption. The use of two keys overcomes a major weakness in symmetric key cryptography, since a single key does not need to be securely managed among multiple users.
Enterprise organization stores lot of sensitive information including regulated data, employee data and intellectual property. Unfortunately these data becoming more and more vulnerable to lose or theft each day this increases risk in data breaching.
Data breaching can be related to three primary factors.
1. Increasing volume of data: the data researchers say that data volume increases by an average of 60% per year in an enterprise organization.
2. The rise of targeted attacks: cyber adversaries regularly targets large organizations with the goal of stealing valuable data.
3. Weakness of cyber security: in spite of rise in cybercrimes and hacktivisim the state of cyber security is becoming worst due to lack of security and unskilled people. In a recent survey 49% of organizations reported at least one successful malware attack
To overcome these problems and to improve the data security and control the integrity most of the organizations use data encryption technology for security and integrity.
Encryption technology can be categorized into Application encryption, file system and database encryption, Network encryption, and Hard drive encryption and alternately storage encryption.
About the Author: Azhar Mohammad is a Technical Engineer working in our SME team providing support services to our SME customers across the UAE.
Disclaimer: All content provided on this blog is for informational purposes only. COMMit makes no representations as to the accuracy or completeness of any information on this site or found by following any link on this site. COMMit will not be liable for any errors or omissions in this information nor for the availability of this information. COMMit will not be liable for any losses, injuries, or damages from the display or use of this information. These terms and conditions of use are subject to change at any time and without notice.