Question

Given that cryptography has been demonstrated to be a strong defense and essential part of the...

Given that cryptography has been demonstrated to be a strong defense and essential part of the information security management strategy, explain why this is so and give examples of how cryptography can be used to specifically protect information moving inside the public cloud. Consider specifically the need for security between an organization and a cloud based SaaS provided say for “off campus” e-mail services.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

First, let's understand what is Cryptography in information security management - Cryptography is used to encrypt data in such a way that its meaning is not revealed while exchange. Information in today's age is the most important aspect of any organization and to protect these information sets, layers of encryption are executed. Cryptography hence plays an essential role in confidentiality, integrity and data retention.

For example - A message in the organization on Saturday is floated on an off-campus email service

Message - Meeting at five (this is plain text message)

OGGVKPI CV HKXG (Ciphertext message where one letter is substituted by one skipped letter)

This is what earlier cryptography used to do to ensure the security of the message. But this was more of pattern-driven.

Now, cloud-based software-as-a-service (SaaS) means that a cloud provider is providing all the facilities and the organization is only accessing the cloud and adding data into it. Since cloud provider provides infrastructure it becomes their responsibility for the security of the network and physical security of the cloud system.

Therefore, to ensure message encryption to hide its meaning various other ciphers were introduced to protect data moving inside the cloud. For instance, Polyalphabetic Substitution Ciphers which includes the cipher key and plain text as mentioned in the table below:

Key S E C U R E S E C U R E
Plain Text g o t o t h e o f f i c

In this way, each letter in the cipher key corresponds to the plain text message, here the key is SECURE and each of the row element represents the cipher message to encrypt the message. This can be used to encrypt data which is difficult to decode as the reference data set is large and the real value or message is kept in the index table.

Then there is Transposition Cipher: In this Type of Ciphering, each letter is used in separate lines to encrypt the meaning of the message. For example:

To write an e-mail message like 'Do you have the training module'?

d y u a e h t a n n m d l
o o h v t e r i i g o u e

Here the message is written in the separate rows and columns to protect the meaning.

Codebooks is another such technique used in data entering the cloud, where symbols are used to denote the meaning of a message. For example:

You are late for the meeting
$ # % ! * ^

Cloud providers can also help organizations with regulations and certifications like SOC 2 and COBIT and layout certain guidelines for the organization to comply with.

And we also have a digital signature which does not fall in the encryption but is a good way to communicate and send emails on cloud-based platforms to protect the message by adding a digital signature or password.

Add a comment
Know the answer?
Add Answer to:
Given that cryptography has been demonstrated to be a strong defense and essential part of the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Examining the Importance of Data Governance in Healthcare By Shannon Fuller, MBA HEALTHCARE HAS ALWAYS focused...

    Examining the Importance of Data Governance in Healthcare By Shannon Fuller, MBA HEALTHCARE HAS ALWAYS focused on managing information from application to application, instead of looking at information holistically and defining it holistically. The industry's shift of focus onto analytics—whether it's for predictive analytics or modeling for improved readmission rates—puts the focus back on foundational data. Ihat's what is needed for things like population health, which is increasingly important in healthcare. Patient data isn't held or uséd solely in electronic...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • 1) analyze the following case 2) give a summary and suggest ways for the company ——————...

    1) analyze the following case 2) give a summary and suggest ways for the company —————— Salesforce.com, one of the most disruptive technology companies of the past few years, has single-handedly shaken up the software industry with its innovative business model and resounding success. Salesforce provides customer relationship management (CRM) and other application software solutions in the form of software as a service leased over the Internet, as opposed to software bought and installed on machines locally. The company was...

  • Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the...

    Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the marketplace? Explain through the case of Citibank. please make sure you give a unique answer (not copied one) ,Please no hand writing, and need references. This question is from ECOM 421 e-Business Strategies and Business Models course e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet....

  • 1.. All following elements have been identified as important to supporting school’s level of involvement with...

    1.. All following elements have been identified as important to supporting school’s level of involvement with law enforcement EXCEPT: A. The school and local law enforcement have developed a memorandum of agreement, (MOA), defining the roles and responsibilities of both. B. The school threatens children with punishment from law enforcement officials for even the most minor infractions. C. The school has developed and maintained an effective relationship with law enforcement. D. The school reports incidents of crime and violence to...

  • e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today...

    e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet. They are aware of the opportunities and threats that are associated with the Web. Not a single traditional bank is brave enough to face investment analysts without an Internet strategy. But even a very thoughtful approach to the Web may do no good to the company/ organization. The main purpose behind launching online...

  • The case on Tata Steel captures the success story of Tata Steel very effectively as to...

    The case on Tata Steel captures the success story of Tata Steel very effectively as to how a giant corporation, led by a world-class management team, reinvents itself and sets out on a growth path when faced with dramatic challenges from the environment. This analysis is aimed at summarizing some of the issues and the challenges Tata Steel is likely to face in the years ahead. An attempt has also been made to arrive at some broad strategies and initiatives...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Playgrounds and Performance: Results Management at KaBOOM! (A) We do this work because we want to...

    Playgrounds and Performance: Results Management at KaBOOM! (A) We do this work because we want to make a difference in the world; how can we go further faster? - Darell Hammond, CEO and co-founder, KaBOOM! Darell Hammond stepped onto the elementary school playground and took a long, slow look around. It was 8 a.m. on an unusually warm fall day in 2002 and the playground was deserted, but Hammond knew the children would start arriving soon to admire their new...

  • For half a century, Seiko has been one of America's best-known watch brands. In good years...

    For half a century, Seiko has been one of America's best-known watch brands. In good years and bad, Seiko quartz watches have been a fixture of the mid-range ($100 to $500) of the vast U.S. watch market. Since 1967, when Tokyo's K. Hattori & Co. set up Seiko Time Corp. in New York, Seiko has been the company's hero brand here. Not anymore. In a major strategic pivot, Seiko Watch Corp. (SWC) in Tokyo, successor to K. Hattori & Co.,...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT