Explain the uses of encryption and the benefits of securing communications by hash functions and other types of encryption. When discussing encryption, be sure to evaluate and assess whether or not to incorporate file encryption, full disc encryption, and partition encryption. Discuss the benefits of using triple DES or other encryption technologies. To complete this task, review the following resources:
Encryption is used to transform simple data into an unreadable format or ciphertext. The ciphertext can be transformed back to the original format by using decryption. This promotes security and ensures that information can only be accessed by authorized users. Hence, encryption is widely used by businesses, institutes, and organizations to securely store and transmit data, maintain confidentiality, and provide restricted access. The National Institute of Standards and Technology’s guideline document describes the use of encryption for stored data:
Encryption can be applied granularly, such as to an individual file containing sensitive information, or broadly, such as encrypting all stored data. The appropriate encryption solution for a particular situation depends primarily upon the type of storage, the amount of information that needs to be protected, the environments where the storage will be located, and the threats that need to be mitigated.