全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2017 

Using Cryptology in Enforcing Database Security Traveling Through Networks and Cloud Computing

DOI: 10.15226/2474-9257/2/3/00116

Full-Text   Cite this paper   Add to My Lib

Abstract:

This paper discusses what cryptography is, the practice of using cryptography, and different cryptographic algorithms and their strengths and weaknesses. Cryptographic measures are often the last line of security in a potential security breach and it is important to implement into an organization’s security grid. However, using a cryptographic system does come with risks. This paper will go over those risks as well as what makes a cryptographic system strong and what makes them weak. Using a weak cryptographic system can be worse than using no cryptography at all, and we will look into some of the potential attacks on a weak cryptographic system

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133