Cast encryption in major role for secure data
The first step in keeping information locked away from prying eyes is to make it safe in transit across the networks that connect users. That means using encryption suitable to the type of information being transmitted.
The first step in keeping information locked away from prying eyes is to make it safe in transit across the networks that connect users. That means using encryption suitable to the type of information being transmitted.There are a wealth of encryption standards available to government agencies. But managing encryption can be a bigger challenge than picking the right technology. Encryption management is a problem that comes in multiple flavors. Encrypted storage files or whole storage devices might keep a single encryption key for the entire lifetime of the data within it. Point-to-point encryption systems, such as encrypted IP networks or remote-office virtual private network connections, share a single key for a fixed period of time that has to be distributed securely to all points on the network each time it is changed.And systems that control access to data at an individual level, such as public-key infrastructure systems, require the management of thousands, or even millions, of pairs of encryption keys, a task that becomes even stickier when those keys are issued by different organizations sharing access to the same data. Key distribution is becoming an integrated part of the management systems for network and application infrastructure, such as network management systems. Cisco Systems Inc.'s CiscoWorks, for example, uses the Internet Key Exchange protocol to distribute the Advanced Encryption Standard and other encryption keys across routed VPNs. This kind of integration eventually will make encryption a transparent part of IT, and make it easier for agencies to collaborate securely.
Kevin Jonah, a Maryland network manager, writes about computer technology.
Kevin Jonah, a Maryland network manager, writes about computer technology.