K-Discussion 3-provide replies to below discussions

I’m trying to study for my Computer Science course and I need some help to understand this question.

Struggling to find relevant content? Order a custom essay on
K-Discussion 3-provide replies to below discussions
Let our experts save you the hassle
Order Now

Main que:The use of encryption can have adverse effects on incident response and incident investigations; however, from a security standpoint, encryption is a major component in network confidentiality. Present your argument for or against an “universal key” which would allow investigators the ability to decrypt data for an investigation. State your position and back-up your stance with 5 or 6 sentences supporting your stance from information you found in related cases or arguments made in online publications. Do not plagurize, use your own words when presenting.

provide replies to below discussions each in 150 words.

Aman-One of the security measures that has been adopted in ensuring data security is through encryption. To Huang, Dai, Leu, & You (2015), encryption allows only people with cryptographic keys to access information which is an important aspect when it comes to data confidentiality. Under the CIA triad, it is important to encrypt data to ensure that incidences of data snooping while being sent over the internet are avoided. To Runnegar (2017), various cases of date being breached have been reported especially when this data is not encrypted. Therefore, this indicates the importance of encrypting data in today’s internet usage era where cybersecurity issues are a major concern (Augenstein, 2015).

However, as much as encryption assures confidentiality, it impedes investigation. Back in 2015, the FBI director Mr. Comey indicated that strong encryption used in tablets, phones, and laptops may inhibit investigations from taking place, as only those having the right credentials can access these devices (Claburn, 2015). According to Augenstein (2015), for investigation to be carried out, there ought to be enough information and data to facilitate prosecuting an individual. However, when people refuse to decrypt information, the investigation department cannot convict an individual (Runnegar, 2015).

According to Huang et al. (2017), encryption is one of the ways of destroying evidence. To Runnegar (2017), one of the ways of destroying electronically stored data is using a strong encryption to and forget the cryptographic keys which can be similar to flushing drugs down the toilet or throwing the murder weapon in the lake. Under such circumstances, the relevant authorities may find it hard to carry out investigation.

In conclusion, as much as electronically data needs to be encrypted, it is important to define a legal framework that will ensure that investigators have access to this evidence when it is needed.

Gow-The utilization of encryption keeps the specialists from getting to potential proof. Decoded information helps in giving profitable data which can be utilized during examinations. The most universal key is utilized to make high verify information discussion. The agent may utilize programming by utilizing private keys and passwords to get to the required data. Examiners may procure these security keys on speculate’s device.

The private key might be spared or recorded for future reference incase overlooked. Now and again where information is erased, even in the reuse, clients may figure it can’t be gotten to once more. Specialists have a method for recouping the erased data since regardless it exists in the arrangement of the machine. PC criminological agents have subtleties on getting to data covered up by the suspect. They recuperate the information utilizing their legal apparatuses in a fitting manner.

For instance, the clients may change the name of the document to maintain a strategic distance from doubt. The disarray raised by the client or the suspect may cause the specialist to require progressively definite data for them to finish their examinations. Information unscrambling helps the law in distinguishing security blemishes. For a situation where security officials get to information sent by fear mongers, it might be utilized as proof. Encryption has turned into a significant component in verifying information and making individual reports classified just as guarding them. Anyway much expensive encryption might be, one may take the expenses for them to verify their information.

There are numerous progressions coming up in the field of PC criminology subsequently the agent should refresh themselves by inquiring about new data under their vocation field. One ought to know about the difficulties to confront and the answer for them. The agent ought to know about the various sorts of encryption used to shroud proof and the strategies to use so as to find them.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
Sign up, place your order, and leave the rest to our professional paper writers in less than 2 minutes.
step 1
Upload assignment instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
s
Get personalized services with GPA Fix
One writer for all your papers
You can select one writer for all your papers. This option enhances the consistency in the quality of your assignments. Select your preferred writer from the list of writers who have handledf your previous assignments
Same paper from different writers
Are you ordering the same assignment for a friend? You can get the same paper from different writers. The goal is to produce 100% unique and original papers
Copy of sources used
Our homework writers will provide you with copies of sources used on your request. Just add the option when plaing your order
What our partners say about us
We appreciate every review and are always looking for ways to grow. See what other students think about our do my paper service.
Other
Amazing work
Customer 452909, September 4th, 2024
Other
I appreciate your work. Thank you????
Customer 452949, September 15th, 2023
Other
good
Customer 452813, June 30th, 2022
Technology
Excellent job on the paper!
Customer 452885, December 28th, 2022
Nursing
Always perfect!!! Don is the best!
Customer 452453, July 27th, 2021
Application Letters
Well written essay, will definitely use this service in the future.
Customer 452773, April 14th, 2022
Human Resources Management (HRM)
Thank you so much.
Customer 452701, August 14th, 2023
Nursing
Writer did an excellent job! Thank you.
Customer 452693, January 14th, 2022
English 101
I'm glad i came to you guys
Customer 452519, May 11th, 2021
Other
awesome
Customer 452813, July 2nd, 2024
Marketing
Thank you great job
Customer 452813, July 10th, 2022
Nursing
Work is always perfectly done.
Customer 452707, January 11th, 2024
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat

Good News ! We now help with PROCTORED EXAM. Chat with a support agent for more information