Free Essay SamplesAbout UsContact Us Order Now

5 different topics on Security

0 / 5. 0

Words: 1375

Pages: 5

44

DATA ENCRYPTION
Students Name
Name of class
Instructor
Institutional Affiliation
Name of City
Date
Data encryption through TrueCrypt and VeraCrypt
The discussion is the importance of enhancing cyber security and is asking organisations and individuals that utilise TrueCrypt as their main encryption for system drives to take a look at its history and consider or suggest alternatives to that encryption to enhance their data security. The devices, such as Laptops and Personal Computers installed with TrueCrypt encryption are particularly vulnerable to hacking and should, therefore, be protected by other secure encryptions such as VeraCrypt. Organisations and companies should have discussions and research on encryptions as the (discussions) touch on the issue of endpoint encryption that is very critical in cyber and systems security (CodePlex, 2016).
According to reliable sources, TrueCrypt was discontinued in 2014 due to being part of the open-source encryption project which was ineffective. VeraCrypt is therefore considered to be a much better and reliable encryption because it enhances systems security in a manner that makes it difficult for hackers to penetrate. Additionally, VeraCrypt resolves many issues found in TrueCrypt. Many systems experts have discouraged the use of TrueCrypt as cyber and systems encryption. Organisations and individuals, therefore, need to utilise other reliable and secure encryptions to keep data safe and protect consumers’ sensitive information (Esecurityplanet.

Wait! 5 different topics on Security paper is just an example!

com, 2016). Exploring other newer encryption systems that are secure and reliable is a sure way of enhancing cyber users’ peace of mind and creating a better world free of attacks from cyber hackers and related stress. Having discussions with cyber experts as recommended is a great way of highlighting and creating awareness on cyber security thus eliminating ignorance associated with cyber insecurity. Many organisations and individuals rely on systems experts to keep their data safe, but if they do not know the exact systems that are supposed to keep their data safe, then there will be a problem. In conclusion, these organisations should be better trained to ensure and guarantee data protection.
References
CodePlex. (2016). VeraCrypt. [Online] Available at: https://veracrypt.codeplex.com [Accessed 1 Jul. 2016].
Esecurityplanet.com. (2016). VeraCrypt a Worthy TrueCrypt Alternative – eSecurity Planet. [Online] Available at: http://www.esecurityplanet.com/open-source-security/veracrypt-a-worthy-truecrypt-alternative.html [Accessed 1 Jul. 2016].
Appendix
Data Encryption

Get quality help now

Oscar Gilmore

5,0 (576 reviews)

Recent reviews about this Writer

My classmates always envy me and ask me how I can be so smart to receive the best grades in the class. Well, we know the secret. I’m happy to have this company as an assistant and even a friend.

View profile

Related Essays

Cyberattack Brief

Pages: 1

(275 words)

History Islam Text 4

Pages: 1

(275 words)

Initial Post

Pages: 1

(275 words)

Dueling claims on crime trend.

Pages: 1

(275 words)

Business Management Couchsurfing

Pages: 1

(275 words)

statement opinions

Pages: 1

(275 words)

Project Proposal

Pages: 1

(275 words)

Property Crime

Pages: 1

(275 words)