Article Review II

.docx

School

Liberty University *

*We aren’t endorsed by this school

Course

612

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by PresidentFire53

Report
Running head: ARTICLE REVIEW II 1 Article Review II Loaze-Noha Ngassaki Ikounga Ongania Liberty University CSCI 612 February 03, 2024
Running head: ARTICLE REVIEW II 2 Article Review II Introduction The evolution of technology within the world of cybersecurity is constantly affecting the importance of more advanced securing methods or practices to aid in the security of systems such as quantum computing. The article titled “Systems Security Affectation with the Implementation of Quantum Computing,” authored by Novoa Torres, Juan Carlos Suarez Garcia, and Erik Alexis Valderrama Guancha, delves into the profound implications of quantum computing on existing cryptographic systems. Quantum Computing as a whole provides more advanced processing capabilities but it also poses risks to the cryptographic frameworks that secure digital information. This review will assess the authors point of view and insights on the subject as well as explore the integration of a Biblical concept in tackling this more advanced security . Authors Objectives Analyze the impact of quantum computing on current encryption methods. Explore quantum computing cryptographic systems and their potential to enhance data security. Highlight the necessity for transitioning to quantum-resistant cryptographic algorithms to safeguard against quantum computing threats. Discuss the implications of quantum computing advancements on the broader field of information technology, emphasizing the balance between innovation and security. Research Objectives Assess the validity and comprehensiveness of the proposed quantum cryptographic models and their practical applicability. Investigate the readiness of current cybersecurity infrastructures to adapt to quantum computing advancements. Examine the ethical and societal implications of quantum computing on data privacy and security. Research Questions 1. How will the transition to quantum-resistant cryptographic systems impact the overall architecture of global information security frameworks? 2. What ethical considerations emerge from the potential misuse of quantum computing in the context of privacy and data protection? 3. To what extent can biblical principles of stewardship and integrity guide the development and implementation of quantum computing technologies in securing data? Narrative This review dives into the extraordinary capability of quantum figuring as illustrated by Torres, Garcia, and Guancha, featuring the double idea of quantum progressions as both a shelter
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help