5 different topics on Security
Words: 1375
Pages: 5
136
136
DownloadDATA ENCRYPTION
Students Name
Name of class
Instructor
Institutional Affiliation
Name of City
Date
Data encryption through TrueCrypt and VeraCrypt
The discussion is the importance of enhancing cyber security and is asking organisations and individuals that utilise TrueCrypt as their main encryption for system drives to take a look at its history and consider or suggest alternatives to that encryption to enhance their data security. The devices, such as Laptops and Personal Computers installed with TrueCrypt encryption are particularly vulnerable to hacking and should, therefore, be protected by other secure encryptions such as VeraCrypt. Organisations and companies should have discussions and research on encryptions as the (discussions) touch on the issue of endpoint encryption that is very critical in cyber and systems security (CodePlex, 2016).
According to reliable sources, TrueCrypt was discontinued in 2014 due to being part of the open-source encryption project which was ineffective. VeraCrypt is therefore considered to be a much better and reliable encryption because it enhances systems security in a manner that makes it difficult for hackers to penetrate. Additionally, VeraCrypt resolves many issues found in TrueCrypt. Many systems experts have discouraged the use of TrueCrypt as cyber and systems encryption. Organisations and individuals, therefore, need to utilise other reliable and secure encryptions to keep data safe and protect consumers’ sensitive information (Esecurityplanet.
Wait! 5 different topics on Security paper is just an example!
com, 2016). Exploring other newer encryption systems that are secure and reliable is a sure way of enhancing cyber users’ peace of mind and creating a better world free of attacks from cyber hackers and related stress. Having discussions with cyber experts as recommended is a great way of highlighting and creating awareness on cyber security thus eliminating ignorance associated with cyber insecurity. Many organisations and individuals rely on systems experts to keep their data safe, but if they do not know the exact systems that are supposed to keep their data safe, then there will be a problem. In conclusion, these organisations should be better trained to ensure and guarantee data protection.
References
CodePlex. (2016). VeraCrypt. [Online] Available at: https://veracrypt.codeplex.com [Accessed 1 Jul. 2016].
Esecurityplanet.com. (2016). VeraCrypt a Worthy TrueCrypt Alternative – eSecurity Planet. [Online] Available at: http://www.esecurityplanet.com/open-source-security/veracrypt-a-worthy-truecrypt-alternative.html [Accessed 1 Jul. 2016].
Appendix
Data Encryption
Subscribe and get the full version of the document name
Use our writing tools and essay examples to get your paper started AND finished.