Professional Documents
Culture Documents
M2 While Task 2 PRADO
M2 While Task 2 PRADO
BSIT - 3A
KEY GENERATION - Key generation is managed poorly when the key is weakly
generated. A weak key will make it easier for hackers to hack it.
KEY ESTABLISHMENT - This is a procedure that establish a secret key material that
is shared to different parties or organizations. The key should just be available to
the intended recipient.
KEY BACKUP - Key backup is really important because it can be used to be able
to reactivate or to regain access to a file that has lost its key. Without this, there
is a risk of not being able to access the data.
KEY USAGE - Key usage is important because only those who are authorized can
use the key.
KEY ARCHIVAL - Key archival is like key backup wherein an old encrypted key is
being stored in secure storage for future references, archiving and storing keys is
important in this phase because we know that used keys are being deactivated
and converted into new encryption, and with that, if we forgot the new
encrypted key we still have the archived old key to decrypt the data.
KEY CHANGE - It is important in this stage to change the key if you think it can
easily be breached by hackers. Keep in mind that the updated key should not
be too basic for hackers to know and make sure that you will remember the key
that you changed.