Question

In: Computer Science

What are the type(s) of cybersecurity issues that encryption may not be able to solve?

What are the type(s) of cybersecurity issues that encryption may not be able to solve?

Solutions

Expert Solution

Encryption and decryption is a part of cryptography and cryptography does not solve security problems, it just solves data access restrictions. Security is a whole concept of its own and encryption is just a small part of it. Which means, if a piece of data was easily accessible to the attacker before encryption, encrypting it would not transform the problem in any way. The attacker just needs to move and change the angle of attack a bit to find the weakest link. Some types of issues which cannot be solved by encryption are:

Insider threat: Encryption is as good as securing the credentials which is used to access the data. So, an insider only has to tweak the credentials of the administrators who have access to the encrypted data. Also, if someone knows the type of encryption being used, or the key which is being used, encryption can be nullified and the attacker gets full access to the data. A classic example of this are the activities of Edward Snowden.

Attacks on system integrity: Malware and virus attacks are integrity attacks, and irrespective of the encryption technique used, if there is no integrity in the system, the attacker will be successful in leaking the information. An example of this attack is the Target compromise where the end result was loss of customer credit card data.It was not caused by the lack of encryption, but because of a compromise of the machine reader software, database configuration and security layer components.

Misplacing the encryption key: Encryption requires a key to encrypt and decrypt the file. Encryption cannot secure the data if someone misplaces the key and the lost data can never be recovered. Moreover, if a third party or an attacker gets hold of the key, he can directly use the key to decrypt the encrypted data and get access to sensitive information.


Related Solutions

talk about database encryption and what type of encryption for database
talk about database encryption and what type of encryption for database
BUDGETING i. what are budget design issues and solutions that may be adapted to solve these...
BUDGETING i. what are budget design issues and solutions that may be adapted to solve these issues? [10 marks] BALANCE SCORECARD i. how does the balance scorecard help to deliver a manufacturing firm's mission statement using the four perspectives? The following are the mission statements of the firm: • Provide superior returns to our shareholders • Continually improve our business processes • Delight our customers • Learn from our mistakes and work smarter in the future [16 marks]
Solve in steps Head movement evaluations are important because disabled individuals may be able to operate...
Solve in steps Head movement evaluations are important because disabled individuals may be able to operate communications aids using head motion. A paper reported the accompanying data on neck rotation (in degrees) for 14 subjects both in the clockwise (CL) and in the counterclockwise direction (CO). For purposes of this exercise, you can assume that the 14 subjects are representative of population of adult Americans. Subject 1 2 3 4 5 6 7 8 9 10 11 12 13 14...
Answer the following question(s): What might be the effects of not using encryption on network or...
Answer the following question(s): What might be the effects of not using encryption on network or Internet traffic? Why might vendors propose proprietary encryption methods rather than using standard encryption technologies? Make sure you provide a substantive and thorough post.
Q1: Explain generally the situation(s) in which a person may be able to rescind a contract...
Q1: Explain generally the situation(s) in which a person may be able to rescind a contract due to a mistake. Q2: What must happen for a fraudulent representation to occur? What other types of misrepresentation are there?
Illustrate the cybersecurity concerns that may affect the businesses in the $1.5 million Click for Vic...
Illustrate the cybersecurity concerns that may affect the businesses in the $1.5 million Click for Vic campaign that was launched on 23 August 2020. Write a thorough description of the descriptive and predictive data analysis importance in cybersecurity field. Cite your sources.
Illustrate the cybersecurity concerns that may affect the businesses in the $1.5 million Click for Vic...
Illustrate the cybersecurity concerns that may affect the businesses in the $1.5 million Click for Vic campaign that was launched on 23 August 2020. Write a thorough description of the descriptive and predictive data analysis importance in cybersecurity field. Cite your sources. [6marks + 8marks + 1mark for Referencing Style = 15 marks]
Illustrate the cybersecurity concerns that may affect the businesses in the $1.5 million Click for Vic...
Illustrate the cybersecurity concerns that may affect the businesses in the $1.5 million Click for Vic campaign that was launched on 23 August 2020. Write a thorough description of the descriptive and predictive data analysis importance in cybersecurity field. Cite your sources. [6marks + 8marks + 1mark for Referencing Style = 15 marks]
What type of drugs may be prescribed and why?
Mr. K. will be beginning therapy for human immunodeficiency virus (HIV).What type of drugs may be prescribed and why?What would you teach the patient about these drugs and what would be some adverse effects of these drugs you would need to make the patient aware about?
What are barriers of successfully working to solve the issues of the Ebola outbreak i. the...
What are barriers of successfully working to solve the issues of the Ebola outbreak i. the community of Sierra Leone?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT