Swamped with your writing assignments? Take the weight off your shoulder!
Synopsis Many people focus on encryption as they are sending messages from one point to another, but it is possible for a physical device to be stolen or improperly accessed (i.e., accessed by someone who doesn’t have the proper privilege to access that information), and one way of preventing the attacker from reading that device would be to encrypt the data as it stored on the device. This could be done with third-party software, but increasingly operating systems are providing methods to encrypt files in the file system itself. Research Assignment Instructions In this assignment, you will be providing advice to a colleague who is looking for a good recommendation for encryption solutions. Your colleague has files stored on his computer and would like to protect them from unauthorized access. You are required to do the following: Recommend an encryption solution that can protect the files on the computer. This encryption can be something provided by the operating system or third-party software. Explain what is the cost of the use of this encryption solution, and what are the limitations? What is the encryption algorithm used in this encryption and why is this algorithm considered good? Submit your assignment in a Microsoft Word document named Lastname_U2_ResearchAssignment.doc. Submit your file using the below upload instructions. Upload Instructions: Select the Submit Assignment button to the right. Click Choose File, located in the File Upload box. Navigate to your file location. Once the file is located, select it and then select the Open button. Click Submit Assignment to complete the upload process.