This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Cryptographic Products

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Cryptographic Products

Cryptography is the process of protecting information or communication using codes. Modern cryptography employs mathematical computations and algorithms to convert messages into codes that cannot easily be deciphered (Joshi & Karkade, 2015). Many companies or vendors provide encryption products that users can incorporate in their systems to secure data or communication. Different companies have stood the test of time in the provision of cryptographic products such as Linux, Apache, and McAfee among others. Price (2013) notes that most governments develop different restrictions on cryptography because of the threat of accessing sensitive information. However, the Internet has contributed to the distribution of powerful open-source cryptographic tools and programs allowing most cryptosystems and concepts to be available in the public domain (Bosu, 2013). While one may assume open-source cryptography is less secure, this is not the case. It is open to reviews and auditing from top security experts from across the globe allowing more bugfixes (Bosu, 2013). This means it stands on strong hardware from top security companies such as Linux.

Open source cryptography is used by allowing access to many users. It is mostly released through a license where the copyright holder provides users in public domain permission to use, review, alter, and distribute to others for any purpose (Bosu, 2013). Open source offers different solutions to modern computer security problems. For example, many experts provide resolutions to problems such as the vulnerability of data on the cloud. Open source cryptography tools are effective because they allow open exchange of information. This ensures they are more cost-effective, flexible, and secure (Bosu, 2013). Open source is effective because many large organizations support and develop open-source cryptography such as the Apache Software Foundation. The trade-off between security and business efficiency lies in the fact that none can be neglected. While security is valuable, it involves a cost. However, a business cannot survive without security because it would decrease business efficiency (Ioannidis et al., 2012). Businesses create a balance in the cost of investing in security to ensure business success.

 

 

References

Bosu, A. (2013). Modeling modern code review practices in open source software development organizations. In Proceedings of the 11th International Doctoral Symposium on Empirical Software Engineering.

Ioannidis, C., Pym, D., & Williams, J. (2012). Information security trade-offs and optimal patching policies. European Journal of Operational Research, 216(2), 434-444.

Joshi, M. R., & Karkade, R. A. (2015). Network security with cryptography. International Journal of Computer Science and Mobile Computing, 4(1), 201-204.

Price, R. (2013). “Modern Cryptography – A Mathematician in Cyberspace. Royal Agricultural University. https://nanopdf.com/download/modern-cryptography-a-mathematician-in-cyberspace_pdf.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask