%0 Journal Article %T Using Cryptology in Enforcing Database Security Traveling Through Networks and Cloud Computing %A Ihssan Alkadi %J Journal of Computer Science Applications | Computer Science Impact Factor Journals %D 2017 %R 10.15226/2474-9257/2/3/00116 %X This paper discusses what cryptography is, the practice of using cryptography, and different cryptographic algorithms and their strengths and weaknesses. Cryptographic measures are often the last line of security in a potential security breach and it is important to implement into an organization¡¯s security grid. However, using a cryptographic system does come with risks. This paper will go over those risks as well as what makes a cryptographic system strong and what makes them weak. Using a weak cryptographic system can be worse than using no cryptography at all, and we will look into some of the potential attacks on a weak cryptographic system %U https://symbiosisonlinepublishing.com/computer-science-technology/computerscience-information-technology16.php