Professional Documents
Culture Documents
Encryption Questions
Encryption Questions
Encryption Questions
What is encryption
Encryption is a security method of changing data to be unreadable and unrecognizable to any non-
authorized party. It take information that would normally be readable such as passwords as an
example and then converts it into a encrypted code.
A key exchange is where both parties who access encrypted data are able to decrypt any data
received by the other party
Authentication protocols are way for multiple parties to sent authentication data amongst one
another. Both/all parties have to verify others for every packet sent and exchanged as to protect
the data.
13. How does human factors and future proofing relate to
encryption Future proofing and human factors (Web view)
Current algorithms and encryption techniques need to be future proofed and ahead of their time
as to protect the data which they are supposed to keep secure. If an algorithm is not future
proofed, it will not take long for the data which it supposedly protects to become vulnerable to
attacks or theft as people will quickly find a way to decrypt the data.
14. What are the key problems or issues related to encryption,
give examples Key Issues/ problems (Web view)
When testing to see whether an encryption algorithm is safe, there is no way to know for sure
whether it truly is secure. It is essentially Schrödinger’s Algorithm: the only way to find out if it is
unsecure is when someone breaks in through either testing or worse, in the real world. If no one
breaks through, there is still no way of knowing whether or not it is actually safe.
15. What type of encryption does video conferencing use
Most video conference services use 128 or even 256-bit encryption. For example, Zoom uses the
256-bit AES-GCM encryption for their video conferences.
16. Discuss the attacks on our DHB’S Cyber-attack on Waikato
DHB- ransomware to encrypt data and demand money
(Web view)
The reason why the Waikato DHB was so vunerable to the attack was due to their lack of strong
encryption algorithm meaning that the attackers did not have too difficult a job getting in. The
attackers intended to disrupt the computer service at the DHB in order to extort money as a way
for the DHB to have their servers and computers returned to normal.
17. Find a New Zealand based company and ask them about
their policies or practices to ensure the protection of data
by using encryption
New Zealand business must abide by the Privacy Act 2020. It essentially outlines that businesses
must protect their clients’ data from unwanted parties which means that business have to use
encryption if handling private digital data.
18. Discuss the future of encryption
Due to human nature and our every growing dependence on computers and servers for storing
important and valuable info, encryption will continue to be highly important. As computers get
faster and more intelligent, encryption algorithms will have to follow the same path in order to
ensure future protection.