The possibilities of encryption information

Nowadays, information in various forms is highly desirable and oftentimes abusive. There are clearly several reasons, among which we could include digitizing data and transmitting information electronically. The reasons are to be helpful to the user on the one hand, in terms of facilitating both wor...

Full description

Bibliographic Details
Main Author: Martin BOROŠ
Format: Article
Language:English
Published: University of Security Management in Košice 2018-12-01
Series:Košická bezpečnostná revue
Subjects:
Online Access:http://kbr.vsbm.sk/2018/n2/boros.pdf
id doaj-fe0c24fa4d094fe3bb76dc2bf236fa1f
record_format Article
spelling doaj-fe0c24fa4d094fe3bb76dc2bf236fa1f2020-11-25T00:30:42ZengUniversity of Security Management in KošiceKošická bezpečnostná revue1338-48801338-69562018-12-012217The possibilities of encryption informationMartin BOROŠ0Department of Security management, University of Žilina, SlovakiaNowadays, information in various forms is highly desirable and oftentimes abusive. There are clearly several reasons, among which we could include digitizing data and transmitting information electronically. The reasons are to be helpful to the user on the one hand, in terms of facilitating both working and private life. On the other hand, however, the possibility of misuse of the transmitted information, which should only be addressed to the recipient, is created. From the above mentioned, the need for adequate protection of information in the company has resulted in the use of encryption or cryptography through which unauthorized persons have no access to information. With the development of information technologies, various standards of information encryption have been created, with an increasing interest in the protection and security of information. Encrypting information is transformed into an unreadable or unclear form, and its full meaning can only be obtained by using the key needed to decrypt content. The aim of the contribution is to clarify the meaning and possibilities of encryption with a practical example of encryption of information transmitted to the centralized protection desk.http://kbr.vsbm.sk/2018/n2/boros.pdfinformationencryptionsecurityprotectionalarm transmission system
collection DOAJ
language English
format Article
sources DOAJ
author Martin BOROŠ
spellingShingle Martin BOROŠ
The possibilities of encryption information
Košická bezpečnostná revue
information
encryption
security
protection
alarm transmission system
author_facet Martin BOROŠ
author_sort Martin BOROŠ
title The possibilities of encryption information
title_short The possibilities of encryption information
title_full The possibilities of encryption information
title_fullStr The possibilities of encryption information
title_full_unstemmed The possibilities of encryption information
title_sort possibilities of encryption information
publisher University of Security Management in Košice
series Košická bezpečnostná revue
issn 1338-4880
1338-6956
publishDate 2018-12-01
description Nowadays, information in various forms is highly desirable and oftentimes abusive. There are clearly several reasons, among which we could include digitizing data and transmitting information electronically. The reasons are to be helpful to the user on the one hand, in terms of facilitating both working and private life. On the other hand, however, the possibility of misuse of the transmitted information, which should only be addressed to the recipient, is created. From the above mentioned, the need for adequate protection of information in the company has resulted in the use of encryption or cryptography through which unauthorized persons have no access to information. With the development of information technologies, various standards of information encryption have been created, with an increasing interest in the protection and security of information. Encrypting information is transformed into an unreadable or unclear form, and its full meaning can only be obtained by using the key needed to decrypt content. The aim of the contribution is to clarify the meaning and possibilities of encryption with a practical example of encryption of information transmitted to the centralized protection desk.
topic information
encryption
security
protection
alarm transmission system
url http://kbr.vsbm.sk/2018/n2/boros.pdf
work_keys_str_mv AT martinboros thepossibilitiesofencryptioninformation
AT martinboros possibilitiesofencryptioninformation
_version_ 1725325440075169792