Essay (Conclusion)

Cryptography is an effective method of preventing using data by unauthorised people to save personal information. There is a massive development which improves the quality of security programmes. Cryptography began many years ago as it took part in the military, at present the main function of if, is to secure stored data. I think that now it would not be possible to survive without cryptography as this method of security is present in everyday life, when accessing sources such as banks as well as in national security which acts in the best interest of the society.


References:

Rouse, M., 2020. What Is SSL (Secure Sockets Layer)? - Definition From Whatis.Com. [online] SearchSecurity. Available at: <https://searchsecurity.techtarget.com/definition/Secure-Sockets-Layer-SSL> [Accessed 30 October 2020].

Russell, A., 2020. What Is HTTPS? - SSL.Com. [online] Ssl.com. Available at: <https://www.ssl.com/faqs/what-is-https/> [Accessed 30 October 2020].

McFadden, C., 2020. 11 Cryptographic Methods That Marked History: From The Caesar Cipher To Enigma Code And Beyond. Interestingengineering.com. Available at: <https://interestingengineering.com/11-cryptographic-methods-that-marked-history-from-the-caesar-cipher-to-enigma-code-and-beyond> [Accessed 21 October 2020].

Inman, D., 2020. Rejewski & Enigma. London: Science Museum London. Available at: <https://www.cell.com/action/showPdf?pii=S2666-3899%2820%2930011-8> [Accessed 21 October 2020]. 

Polk, R. and Froncek, A., 2020. Your Day With Encryption | Internet Society. Internet Society. Available at: <https://www.internetsociety.org/blog/2019/10/your-day-with-encryption> [Accessed 21 October 2020].

Nohe, P., 2020. The Difference Between Encryption, Hashing And Salting. Hashed Out by The SSL Store™. Available at: <https://www.thesslstore.com/blog/difference-encryption-hashing-salting> [Accessed 21 October 2020].   
 

Brown, A., 2020. The Basics Of Cryptography. Medium. Available at: <https://towardsdatascience.com/the-basics-of-cryptography-80c7906ba2f7>

Comments

  1. Hi

    It seems that you have very few entries after continuous assessment.

    Please do not fall behind and keep blogging and updating posts because please do remember the final assessment is solely based on the content of your blog.

    We have to put additional effort to ensure we have more than the minimum required posts, with great detail, references, images, diagrams, tables, charts and even videos.


    Please complete pending work as we have discussed previously and start working upon case study.


    Many thanks
    Chirag

    ReplyDelete

Post a Comment

Popular posts from this blog

SSL Asymmetric Encryption (Diagram 2)

Opinion about safety (Survey Analysis)

How Ransomware attack works? (Models & Methodologies)