Select ONE ARTICLE from the following links and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements. What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words. this is the background of lecture. – Information security is the protection of information and systems from unauthorized access, disclosure, modification, destruction or disruption. – Businesses should adopt an Information Security Policy as a measure to protect the confidentiality, integrity and availability of institutional data as well as any information systems that store, process or transmit data. – This week we will cover the importance of developing an Information Systems Policy and the Information Security Principles of Success. – Review Weekly Assignments

Title: “The Role of Encryption in Information Security”

In the article “The Role of Encryption in Information Security,” the author discusses the importance of encryption as a fundamental component of information security. Encryption is defined as the process of encoding information in a way that makes it unreadable to unauthorized individuals. It ensures the confidentiality, integrity, and availability of data, protecting it from unauthorized access, modification, or destruction.

The article emphasizes that businesses should adopt encryption as a fundamental security measure to safeguard sensitive data. Encryption transforms plain text into cipher text using complex algorithms, making it nearly impossible for unauthorized individuals to decipher the original content without the encryption key. By implementing encryption, organizations can protect their data both at rest and in transit, mitigating the risk of data breaches and unauthorized disclosure.

The author highlights that encryption technology plays a crucial role in protecting data stored in databases, file systems, and cloud environments. It acts as a safeguard against data theft, ensuring that even if an attacker gains unauthorized access to the data, it remains unreadable without the proper encryption key. Encryption also provides data integrity by detecting any unauthorized modifications made to the encrypted data. Additionally, it contributes to the availability of data by ensuring that only authorized users with the encryption key can access the information.

Moreover, the article emphasizes the importance of encryption in securing data during transmission over networks. With the proliferation of internet connectivity, organizations frequently transmit sensitive information across various networks, making it susceptible to interception by attackers. Encryption provides a way to protect data in transit by encrypting the transmitted data and decrypting it only at its intended destination. This ensures that even if intercepted, the data remains unreadable and inaccessible to unauthorized individuals.

In conclusion, the article underscores the crucial role of encryption in information security. Through its ability to protect data at rest and in transit, encryption is an essential tool for safeguarding sensitive information. By adopting encryption as a fundamental security measure, organizations can bolster the confidentiality, integrity, and availability of their data, mitigating the risk of unauthorized access, modification, or disclosure.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.

Click Here to Make an Order Click Here to Hire a Writer