Friday, November 11, 2011

7.1 How Encryption Work


Our business would be be threatened by the 5 most common threats to information systems security. Because there could be a natural disaster. Where our business is based they have had earthquakes and hurricanes. Another threat would be out database admin. If with the them have access to our data at all times. Another threat would be if our employee is checking email and there is a virus in it. Last would be hackers, and crackers.To safeguard our information system from exposure to theses threats, we will move our servers, and place back up servers in different states. Next we will only allow our database admin a certain time to access the system. Then we will have certain sights blocked on the we. Last to prevent the hackers we will put in place a firewall.
Part B.
All encryption systems use a key, the code that scrambles and then decodes messages. When both sender and recipient use the same key, this is called a symmetric secret key system.
1.SunShine Land will send a layout document of our rollercoaster design and emails it to the architect plus company
2.SunShine Land will use the architect plus company public key to encrypt a message
3. Architect plus uses there private key to decrypt the message
4. Architect plus can read or print our decrypted message

No comments:

Post a Comment