Protect Yourself Online by David Chappelle
Author:David Chappelle [Chappelle, Dave]
Language: eng
Format: epub
ISBN: 9781412212014
Publisher: Author Solutions Inc.
Published: 2007-07-31T16:00:00+00:00
10 Encryption
Encryption is the locking of a file, data, or data storage device to prevent unauthorized access and/or use. Decryption is the unlocking of that file, data, or data storage device.
Like backup devices, off-site storage, and even condoms, everyone knows encryption is a good idea and should be used, but most don’t want to go through the bother. That may change as more people become aware of the benefits of encryption, and the risks of information falling into the wrong hands.
What Can Be Encrypted?
Almost anything can be encrypted. A file, a document, a hard drive, a CD-ROM before it is recorded, floppy disk, email; all can be protected with encryption.
Better encryption programs operate in the background, transparent to the user. As long as two parties have keys, or passwords, they can keep prying eyes out.
Keys
A key is like a password. Public key encryption uses one public key that all users have, and one private key, that only one user has.
Suppose Sharon wants to send messages to a group of people, and she only wants members of that group to be able to read her emails. Sharon composes her email, and then encrypts it using her private key. Recipients of Sharon’s emails all have the same “public” key. Anyone with that key can read any encrypted email Sharon sends.
Password Secrecy
When using encryption, give thought to your passwords and keys. Unless you do it in code and in wording that the recipient will understand, there isn’t much sense in either emailing or telephoning a password, as anyone listening can have access over both of those mediums. If your data is important enough to encrypt, keeping your keys away from others is even more important.
Level
There are different types of encryption, but for now we’re concerned with two.
The first I’ll call “Front Door” encryption, similar to what a biometric device might guard. Like a lock on your house front door, once this level is bypassed, all of your files are open for viewing.
The second we’ll refer to as “Block-Level” or “total” encryption. Here, each 64-bit block of data is separately encrypted. This is much more secure, and therefore much harder to crack.
One can often read on e-commerce websites that 128-bit encryption is the best currently available. That is not true. Higher level, like 1024-bit encryption is available, but isn’t practical for most users. The higher the level of encryption, the slower the message will transfer, and the more system resources are required to transmit the message.
For years PC Guardian (www.pcguardian.com) has made 192-bit encryption programs. Conclusive (www.conclusive.com) is another encryption company.
Perhaps the most popular encryption software is PGP, which stands for Pretty Good Privacy. (www.pgp.com)
Hardware Keys
There are many hardware keys available on which you can store your key or password. These are usually about the size of a standard house or auto key, and plug into the USB port of a computer. Your data is protected by another password. If you forget the password, the hardware key is useless. Some software programs use these keys to prevent unlicensed copying.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(26619)
The Fifty Shades Trilogy & Grey by E L James(19100)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19081)
Shot Through the Heart by Mercy Celeste(18955)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17139)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17026)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(16898)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16840)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16470)
The Subtle Art of Not Giving a F*ck by Mark Manson(14384)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14158)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(13676)
Scorched Earth by Nick Kyme(12788)
Drei Generationen auf dem Jakobsweg by Stein Pia(10984)
Suna by Ziefle Pia(10903)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(10523)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(10487)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(10454)
Scythe by Neal Shusterman(10367)
