-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathTRoman.html
More file actions
115 lines (97 loc) · 4.8 KB
/
TRoman.html
File metadata and controls
115 lines (97 loc) · 4.8 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html>
<head>
<title>Digital Security - Password Encryption</title>
</head>
<body style="background-color: lightgoldenrodyellow;">
<font size="+1">
<center>
<table style="width:100%" border="5" cellspacing="5" cellpadding="3">
<tr>
<td style="width:25%">
<center>
<a style="text-decoration:none" href="index.html">
<b>
Home
</b>
</a>
</center>
</td>
<td style="width:25%">
<center>
<a style="text-decoration:none" href="MVangsycha.html">
<b>
Firewall Security
</b>
</a>
</center>
</td>
<td style="width:25%">
<center>
<a style="text-decoration:none" href="TRoman.html">
<b>
Password Encryption
</b>
</a>
</center>
</td>
<td style="width:25%">
<center>
<a style="text-decoration:none" href="blog.html">
<b>
Disaster Recovery Planning
</b>
</a>
</center>
</td>
</tr>
</table>
</center>
</font>
<h1>The Second Line of Defense in Digital Security</h1>
<center>
<h1>Password Encryption</h1>
<h2>Originality and Why?</h2>
<p><font face="calibri" size="5"> Password encryption and access codes have been used to protect computer systems for a long time now. As technology systems get more
<strong>complex</strong>, so do the password methods as well. Password commuting and
encryption is always different and no password encryption is the same.
Password encryption is used to <i>ensure<i> that only the user end has access to
whatever is being accessed.</font>
</p>
<img src="https://www.venafi.com/sites/default/files/styles/823x390/public/content/blog/2020-12/Difference%20B%3AT%20Encryption%20%26%20Decryption.jpg?itok=yE_QC6vz" alt="Your Key" width="500" height="200">
<h2>
<font size="6">Encryption</font></h2>
<p>
<font face="Calibri" size="5">
Password Encryption is the process by which a password that is saved into a databank or server is changed into a more complex. This process makes it harder to access passwords from data leaksor from someone who is attempting to attack personal information.
</font>
</p>
<img src="https://www.venafi.com/sites/default/files/2020-12/Encrypt_Decrypt_Diff_1.png" alt="How it works">
<h2><font size="6"><b>Plain Text "Encrypted"</b></font></h2>
<p>
<font face="Calibri" size="5">
<strong<Encrypted text</strong> is text that is converted from a readable text format to a scrambled one that can only be access via a certain key or login password. Encrypted text is the result from password encryption which makes it very hard to understand what is being protected and what is being hidden. Encrypted texts are also to ensure that the sender and the receiver are the only two parties that are able to read the message. Plain Text is the information that is sent in its normal text format.
</font>
</p>
<img src="https://www.howtogeek.com/wp-content/uploads/2021/04/notepad-text.png?trim=1,1&bg-color=000&pad=1,1" alt="Regular Text">
<h2><font size="6">Decryption</font></h2>
<p>
<font face="Calibri" size="5">
<Strong>Decryption</strong> is the process of converting encrypted text into its original plain text. In other words, it is converted a scrambled text into normal readable text. In a way for a text receiver to understand a text message, a message is changed into regular text once it has reached the right destination, therefore decryption is used.
</font>
</p>
<img src="https://library.ahima.org/~/media/bokImages/1/Chunk%205/104087.ashx?la=en" alt=" Basics of Decryption">
<h2><font size="6">Why to Consider Passwords!</font></h2>
<p>
<font face="Calibri" size="5">
<b>Password Encryption</b> and <b>Decryption</b> are very important in ensuring that private information is kept hidden and is only accessible by the right parties. <i>Passwords</i> are one type of protective measure to ensure that sensitive information is kept hidden only to the user. While it is normal to have one password for every account, switching up passwords is also beneficial. This makes it harder for multiple accounts to be accessed at once, hence making passwords different beneficial.
</font>
</p>
</center>
<h4>References</h4>
<h6>Dhany, Hanna Willa, et al. "Encryption and decryption using password based encryption, MD5, and DES." International Conference on Public Policy, Social Computing and Development 2017 (ICOPOSDev 2017). Atlantis Press, 2017.</h6>
<h6>Morris, Robert, and Ken Thompson. "Password security: A case history." Communications of the ACM 22.11 (1979): 594-597.</h6>
<h6>Herley, Cormac, and Paul Van Oorschot. "A research agenda acknowledging the persistence of passwords." IEEE Security & privacy 10.1 (2011): 28-36.</h6>
</body>
</html>