preview

Case Project 8-1 : Configuring Encryption

Decent Essays

Case Project 5-1: Configuring Encryption in Word 2010 What is the process involved in configuring encryption? Encryption is a process that turns information that is plainly readable into scrambled form in order to preserve the authenticity, integrity, and privacy of the information that passes through the security perimeter (Michael E. Whitman, 2009). It is the conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties (Rouse, 2014). Data, often referred to as plaintext, is encrypted using an encryption algorithm and an encryption key. This process generates ciphertext that can only be viewed in its original form if decrypted with the correct key. Decryption is simply the inverse of encryption, following the same steps but reversing the order in which the keys are applied (Rouse, 2014). The encryption algorithms that are available for use with Office depend on the algorithms that can be accessed through application programming interface in the Windows operating system. CNG allows for more agile encryption, where encryption and hashing algorithms that are supported on the host computer can be specified for use during the document encryption process. CNG also allows for better extensibility encryption, where third-party encryption modules can be used (Microsoft, 2014). Process of encryption configuration. Encryption features are built into all Microsoft office 2010 suite applications. This feature

Get Access