The possibilities of encryption information
Nowadays, information in various forms is highly desirable and oftentimes abusive. There are clearly several reasons, among which we could include digitizing data and transmitting information electronically. The reasons are to be helpful to the user on the one hand, in terms of facilitating both wor...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Security Management in Košice
2018-12-01
|
Series: | Košická bezpečnostná revue |
Subjects: | |
Online Access: | http://kbr.vsbm.sk/2018/n2/boros.pdf |
id |
doaj-fe0c24fa4d094fe3bb76dc2bf236fa1f |
---|---|
record_format |
Article |
spelling |
doaj-fe0c24fa4d094fe3bb76dc2bf236fa1f2020-11-25T00:30:42ZengUniversity of Security Management in KošiceKošická bezpečnostná revue1338-48801338-69562018-12-012217The possibilities of encryption informationMartin BOROŠ0Department of Security management, University of Žilina, SlovakiaNowadays, information in various forms is highly desirable and oftentimes abusive. There are clearly several reasons, among which we could include digitizing data and transmitting information electronically. The reasons are to be helpful to the user on the one hand, in terms of facilitating both working and private life. On the other hand, however, the possibility of misuse of the transmitted information, which should only be addressed to the recipient, is created. From the above mentioned, the need for adequate protection of information in the company has resulted in the use of encryption or cryptography through which unauthorized persons have no access to information. With the development of information technologies, various standards of information encryption have been created, with an increasing interest in the protection and security of information. Encrypting information is transformed into an unreadable or unclear form, and its full meaning can only be obtained by using the key needed to decrypt content. The aim of the contribution is to clarify the meaning and possibilities of encryption with a practical example of encryption of information transmitted to the centralized protection desk.http://kbr.vsbm.sk/2018/n2/boros.pdfinformationencryptionsecurityprotectionalarm transmission system |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Martin BOROŠ |
spellingShingle |
Martin BOROŠ The possibilities of encryption information Košická bezpečnostná revue information encryption security protection alarm transmission system |
author_facet |
Martin BOROŠ |
author_sort |
Martin BOROŠ |
title |
The possibilities of encryption information |
title_short |
The possibilities of encryption information |
title_full |
The possibilities of encryption information |
title_fullStr |
The possibilities of encryption information |
title_full_unstemmed |
The possibilities of encryption information |
title_sort |
possibilities of encryption information |
publisher |
University of Security Management in Košice |
series |
Košická bezpečnostná revue |
issn |
1338-4880 1338-6956 |
publishDate |
2018-12-01 |
description |
Nowadays, information in various forms is highly desirable and oftentimes abusive. There are clearly several reasons, among which we could include digitizing data and transmitting information electronically. The reasons are to be helpful to the user on the one hand, in terms of facilitating both working and private life. On the other hand, however, the possibility of misuse of the transmitted information, which should only be addressed to the recipient, is created. From the above mentioned, the need for adequate protection of information in the company has resulted in the use of encryption or cryptography through which unauthorized persons have no access to information. With the development of information technologies, various standards of information encryption have been created, with an increasing interest in the protection and security of information. Encrypting information is transformed into an unreadable or unclear form, and its full meaning can only be obtained by using the key needed to decrypt content. The aim of the contribution is to clarify the meaning and possibilities of encryption with a practical example of encryption of information transmitted to the centralized protection desk. |
topic |
information encryption security protection alarm transmission system |
url |
http://kbr.vsbm.sk/2018/n2/boros.pdf |
work_keys_str_mv |
AT martinboros thepossibilitiesofencryptioninformation AT martinboros possibilitiesofencryptioninformation |
_version_ |
1725325440075169792 |