Computer Security: Codes Or Encryption?
As computer hackers become increasingly sophisticated and collaborative over their efforts year after year, encryption (no matter how sophisticated or complex) will not provide an adequate defense against various forms of data interception, database compromise, and computer security. Instead of predicting the future, I am going to propose that encryption protocols be augmented by the use of private codes. While codes and code books would seem to be things of the past, they should well be revisited as a means of beating cyber criminals who intend to unlawfully intercept and abuse or corrupt your data.
The combination of encryption and code in securing important emails is a practical application of this combination of technologies. But before going further, allow me to differentiate between codes and ciphers.
Codes, which require a code translation book (preferably not recorded on your business' computers), are word or phrase substitutions. They are used in police and military communications, Gregg Shorthand, and in conveying other sensitive types of data transmissions and critical communications. They are very effective at keeping interlopers unaware of the meaning of the message (even if intercepted) because the only persons who know what the encoded expressions mean are the sender and recipient of the data, each with his or her respective code book. For example, in a message, the expression "All Clear" can easily mean "There is an emergency situation. We have been compromised. Abort the mission." The more code used in a data transmission, the more difficult it becomes for an illicit interceptor to translate the meaning of the correspondence.
Ciphers, as related to encryption rely on formula or algorithms where letters, numbers or symbols are consistently or formulaically substituted by other letters, numbers or symbols. Regrettably, even the most complex algorithms (even compounded ones or temporally shifting ones) are ready targets for hackers. The hackers' work is to find the algorithm -- and there are far too many programs designed to do just that. Codes, if properly constructed and changed periodically, are far more difficult to break. Using a combination of both codes and encryption should be the best practice for electronic communications of private information, and I am optimistic that I have either inadvertently predicted the future or influenced it for the benefit of my readers, clients and colleagues.
Some resource links follow for your further research and reference regarding the brief discussion above:
The Different Types Of Codes And Ciphers
Downloadable Mobile Applications For Codes And Ciphers
Online Cipher Creation Programs And Tools
As always, thank you for reading me.
Douglas E. Castle - Join me on LinkedIn
http://DouglasECastleBlog.com
http://DouglasECastle.com
http://DouglasECastleConsultancy.com
---------------
Labels, Tags, Keywords, Categories And Search Terms For This Article:
computer, security, business, data, cipher, code, encryption, hacker, Douglas E. Castle, The Global Futurist Blog
---------------
Some resource links follow for your further research and reference regarding the brief discussion above:
The Different Types Of Codes And Ciphers
Downloadable Mobile Applications For Codes And Ciphers
Online Cipher Creation Programs And Tools
As always, thank you for reading me.
Douglas E. Castle - Join me on LinkedIn
http://DouglasECastleBlog.com
http://DouglasECastle.com
http://DouglasECastleConsultancy.com
---------------
Labels, Tags, Keywords, Categories And Search Terms For This Article:
computer, security, business, data, cipher, code, encryption, hacker, Douglas E. Castle, The Global Futurist Blog
---------------
THE GLOBAL FUTURIST – Douglas E Castle
http://theglobalfuturist.blogspot.com
Discovering and following significant trends across an extensive range of domestic and international consumer, business, demographic, cultural, economic, political, technological and other key areas of influence and impact on life and business; predicting future change, preparing for it and profiting from it.
Key Terms: business, forecasting, trends, future, prediction, disruption, displacement, innovation, complexity theory, economic waves and cycles, projections, planning
No comments:
Post a Comment