5 Ways to Measure the Quality of Your Cryptography Essay

1243 Words 5 Pages
5 Ways to Measure the Quality of Your Crypto

Introduction
Cryptography is definitely become a more mainstream topic today. Almost every device in this world is connected to the internet and sharing information. At the same time of the increasing of number in the device, the number of sensitive data in the information shared between devices, application, and server is also increasing in a larger scale. That information must be protected, so that the sensitive data will remain private.
The dominance attack today is not just about Denial of Services or Viruses just like 10 or 15 years ago. The nowadays attack is becoming more a specific purpose like data theft, eavesdropping, getting access to sensitive data like credit card numbers,
…show more content…
5 Ways to Measure the Quality of Your Crypto

Introduction
Cryptography is definitely become a more mainstream topic today. Almost every device in this world is connected to the internet and sharing information. At the same time of the increasing of number in the device, the number of sensitive data in the information shared between devices, application, and server is also increasing in a larger scale. That information must be protected, so that the sensitive data will remain private.
The dominance attack today is not just about Denial of Services or Viruses just like 10 or 15 years ago. The nowadays attack is becoming more a specific purpose like data theft, eavesdropping, getting access to sensitive data like credit card numbers, passwords or maybe an intellectual property in an enterprise, or elevating privileges like an insider want to get a higher level access or access higher level value of data in order to dispose it or sell it. The number of attack services is also increasing with cloud computing or mobile devices, we got a lot of applications in different devices. In addition, sensitive data become located in more and more locations so there are more potential weaklings to exploit in to it.
Body
To defend this, the principle of layer security is still a choice. It is the application that run the business and that’s why there is a good mix between traditional tool and modern technology being applied in this area. When applying the layer of security, usually