Verified Document

Expensive Security Software For Pcs Discussion Chapter

6.a.

What I like particularly about this set of requirements is the backup suggestion. While one might take great pains to protect one's machine and actions by means of software, there is always the possibility that something may go fatally wrong. Hence, it is vital to back up one's work in order to ensure that it remains safe, regardless of any dangers to the computer itself.

b.

In this segment, I believe that the suggestion of parental control is vitally important. With the increasingly free availability of information on the Internet, children have much more access to questionable material than the case was in the past. This means that it is the responsibility of parents to ensure that they are safe. In a household with children, this is therefore a very important component.

7.1.

What kind of cryptography is being developed for cloud computing? It is important to know this answer in order to determine what types of information might safely be stored and manipulated in the cloud. Is there any such technology currently available, or is it only being developed as yet?

2.

What kind of cryptography is available for cellular phones other than Kryptomobile? The importance of this question lies in the fact that the user might be able to determine the best type of technology that is available for his or her specific phone.

3.

If I use a Bluetooth device, how might I determine what type of cryptography is available for it, and what type should I use to optimize my security?...

There is indeed cryptography available to ensure the privacy and safety of such conversations. One example is Kryptomobile, which cannot be intercepted. It therefore protects the user against privacy invasions such as call tapping or intercepting for investigation, commercial purposes, or espionage.
b.

While cloud computing is a useful infrastructure for data storage and application use, there is not as yet a good cryptography application to secure the information that users store on this platform. Indeed, cloud operators can manipulate client data, and may not be trustworthy as doing this. Experts are involved in developing cryptographic protocols to mitigate these security risks; however, no standard seems to be in place as yet. Users should therefore exercise care when using cloud computing.

c.

Cryptography is, however, available for Bluetooth devices, especially when the more recent versions of this technology are used. Additional approved cryptographic mechanisms are available at the application layer to help users protect their information. New Bluetooth technology might not require additional cryptographic applications, although it is best if users check whether all the necessary cryptography is in place.

Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now