Ethics in Computerization Ethics in Computerization: Encryption Systems

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 9

ETHICS IN

COMPUTERIZATION

TOPIC :
ENCRYPTION SYSTEMS
PRESENTING FOR :
MR. SATHIYA MURASAN SINGGAL RAIN
PRESENTER BY :
SULIM KOMOI @ DANIEL =
AMIRA HANA BT MOHD AMIRUDIN SHAH = DES02-1208041
JENIFER D/O ALBERT – DES01-1008023
INTRODUCTION TO
COMPANY
INTRODUCTION TO ENCRYPTION
SYSTEM…
• Encryption is the process of transforming information that
referred as plaintext.

• Using an algorithm (called a cipher) to make it unreadable to


anyone except those possessing special knowledge, usually
referred to as a key.

• A process that converts original information, also called plain text


into a difficult-to-interpret form called cipher text.

• Done by using an encryption algorithm, a formula used to turn


plain text into cipher text

• Two types: Asymmetric and Symmetric


Asymmetric encryption
symmetric encryption
WHICH IS BETTER for using …
▪ Even though symmetric is speed and it commonly used for e -
commerce transactions.

▪ Symmetric encryption is fast, it is not as safe as asymmetric


encryption because someone could “steal” the key and decode the
messages.

▪ Asymmetric encryption is more complex and more secure.

▪ Asymmetric encryption's added safety comes at a price: More


computation is required, so the process takes longer.
WHY USING ENCRYPTION…
▪ Authentication
- Protects personal data such as passwords.

▪ Privacy
- Provides for confidentiality of private information.

▪ Integrity
- Ensures that a document or file has not been altered.

▪ Accountability
- Prevents denial or plagiarism.
EXAMPLE OF ENCRYPTION…

▪ Web browser encryption

▪ Email encryption

▪ Hard drive encryption

▪ Operating system protection


EXAMPLE OF
ENCRYPTION…

•Web browser encryption

 Email encryption

 Hard drive encryption


 Operating system protection

You might also like