# It enables organizations to share sensitive sales

• 38

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 20 - 22 out of 38 pages.

It enables organizations to share sensitive sales data, promotion plans, new product designs, and projectstatus data among employees, suppliers, contractors, and others with a need to know.Encryption enables physicians and patients to share sensitive healthcare data with labs, hospitals, andother health treatment facilities as well as insurance carriers.To complete such transactions, sensitive dataincluding names, physical addresses, email addresses,phone numbers, account numbers, health data, financial data, passwords, and PINsmust be sent andreceived.An encryption key is a value that is applied (using an algorithm) to a set of unencrypted text (plaintext) toproduce encrypted text that appears as a series of seemingly random characters (ciphertext) that isunreadable by those without the encryption key needed to decipher it.There are two types of encryption algorithms: symmetric and asymmetric.Symmetric algorithms use the same key for both encryption and decryption. Asymmetric algorithms useone key for encryption and a different key for decryption.Advanced Encryption Standard (AES) is the most widely used symmetric algorithm. Wireless ProtectedAccess 2 (WPA2), which is the most commonly used security protocol for wireless networks today,employs the AES encryption algorithm.
21Compiled by: Ridip KhanalSome of the common encryption methods used are:1.Advanced Encryption Standard (AES)128, 192, 256 bits- Symmetric encryption2.Rivest-Shamir-Adleman (RSA)Asymmetric encryption3.Triple Data Encryption Standard (TripleDES)Symmetric encryptionadvanced form of DES4.Twofish-128 bitsSymmetric encryptionsuccessor of Blowfish5.Elliptic Curve Cryptography (ECC)Asymmetric encryptionMany online shoppers fear the theft of their credit card numbers and banking information. To helpprevent this type of theft, theTransport Layer Security (TLS)communications protocol is used to securesensitive data. Transport Layer Security (TLS) is a communications protocol or system of rules that ensuresprivacy between communicating applications and their users on the Internet. TLS enables a client (suchas a web browser) to initiate a temporary, private conversation with a server (such as an online shoppingsite or bank). Before the client and server start communicating, they perform an automated process calleda “handshake” during which they exchange information about who they are and which secret codes andalgorithms they will use to encode their messages to each other. Then, for the duration of theconversation, all the data that pass between the client and server is encrypted so that even if somebodydoes listen in, they won’t be ableto determine what is being communicated.Proxy Servers and Virtual Private Networks:A proxy server serves as an intermediary between a web browser and another server on the Internet thatmakes requests to websites, servers, and services on the Internet for you.

Course Hero member to access this document

Course Hero member to access this document

End of preview. Want to read all 38 pages?

Course Hero member to access this document

Term
Summer
Professor
N/A
Tags
Ridip Khanal