Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

One hundred years ago, Louis Brandeis and Samuel Warren warned us that, “Numerou

ID: 3602229 • Letter: O

Question

One hundred years ago, Louis Brandeis and Samuel Warren warned us that, “Numerous mechanical devices threaten to make good the prediction that ‘what is whispered in the closet shall be proclaimed from the housetops.’” Cryptography is an enabling technology for self-help privacy. Conversely, cryptography can be used to conceal criminal conspiracies and activities, including espionage. How have computers changed the ways in which we have to keep certain information private? What new threats do computer systems and networks pose to personal privacy? Conversely, what threats are enabled or enhanced by computer systems and networks? How does cryptography help or hinder protection of privacy and public safety? What policies are needed and appropriate in a networked world regarding the use of cryptography?

Explanation / Answer

## Computers have changed a long way to make the life of user easier and secured by poviding various features that help keeping the data private. Operating systems with mullti user environments help the user manage his resources efficiently while keeping his data privately secured so that user can use different profiles for different profiles. Use of various authentication methods like face recognition, finger print sensor etc provide more reliability for user to keep his system and data secured. With the advent of internet the users are able to surf the world at finger tips which enables the new vulnerability for hackers, spammers. But, with the development of much sophisticated softwares and utilities user can protect his data and system.

## Since, we are used to depend on computers for storing data, performing our tasks, any physical damage to those systems can result in data loss, resource wastage. And many of the computer users who dont know the vulnerability issues of the computer is noot keen with securing his computer from malwares and spam wares which may hamper the privacy of the data. Connecting to a network imposes a new threat of handling the content on the network.

## To ensure data security and secured surfing on internet computers use some algorithms to calculate some hash codes or other predefined codes to calculate the reliability of content on network. This enables a new threat on networks for hackers so that they can replicate hashcode and pretend to be the owner on content.

## Cryptography is the best form of computer privacy and security in almost all the organisations. It helps the user in keeping his data private by hiding irrelevent information of one user to other. Keeping personal information is the primary goal of the cryptography. Different information is kept secure by use of cryptography from hackers thus whenever one requires protecting the information, this is one of the few methods which ensure that the entire information is much safer

## Data Privacy and protection od data is the first and foremost policy. Cryptography user electronic form of information hence it is highly recommended to use cryptography. But, We must ensure to use a common cryptography methods to be compatible with other computers. Limited access polity, Liability policy are some of the important policies must be ensured with the use of cryptography.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote