You are on page 1of 8

Cyber Security 1

Cryptography

Student’s Name

Institution

Date
Cyber Security 2

Introduction

In the modern interconnected world Cryptography plays a significant role in safeguarding

privacy and securing sensitive information. Its strength lies in the art of encoding data in a way

that only authorized people can access it, ensuring confidentiality and integrity. This essay aims

to explain the transformation brought about by computers in enhancing data privacy and the

associated impacts. The essay will explain the historical perspective of cryptography, how

computers have reshaped the dynamics of privacy, the emergence of new threats in the modern

digital age, as well as the positive contributions of computer systems to privacy and security.

Additionally, the essay will investigate the dual nature of cryptography, examining how it can

both enhance and impede privacy and public safety. Finally, it reflects on the need for policies

and regulations in a networked world to strike a balance between privacy and security concerns.

History of Cryptography

Cryptography has a long history dating back to ancient civilizations, where it was

employed to secure sensitive messages and military strategies. One of the earliest known

methods was the use of substitution ciphers, where characters were replaced with other

characters according to a predetermined key (Salomon, 2006). For example, Julius Caesar

famously used a simple substitution cipher known as the Caesar cipher to protect his

communications (Holden, 2018). However, these early methods had limitations; they were

relatively easy to break through frequency analysis, which involved examining the frequency of

letters in the encrypted text. Over time, more sophisticated cryptographic techniques emerged,

such as the Vigenère cipher in the 16th century, which added an extra layer of complexity by

using a keyword to encrypt text (Holden, 2018). Despite advancements, historical cryptography
Cyber Security 3

was still vulnerable to codebreakers and lacked the robust security measures that modern

encryption provides.

Impact of Computer of Information Security

Computers have transformed the concept of privacy, bringing in an era in which personal

information is more accessible and vulnerable than ever before. The digitization of data has been

one of the most transformative developments. In the pre-digital era, confidential information was

typically stored on paper, making it difficult to access and share. Computers have enabled the

storage of vast quantities of data in digital format, which can be promptly transmitted, replicated,

and analyzed (Blackburn et al., 2018). This transition has significant implications for privacy, as

digital information is not only more vulnerable to unauthorized access but also more difficult to

control and protect. In the digital age, the convenience of data collection, storage, and

transmission has exposed individuals to new risks and vulnerabilities.

Additionally, the widespread use of computers and the internet has increased the creation

and sharing of personal data. Social media platforms, e-commerce websites, and digital

communication tools have become ingrained in our daily lives, frequently necessitating the

disclosure of personal information. Although these platforms provide ease and connectivity, they

also give rise to challenges concerning the level of control individuals have over their personal

data (Blackburn et al., 2018). The Cambridge Analytica scandal and other data breaches are clear

indications that individuals' digital data can be exploited without their knowledge or consent

(Edition, 2021). Privacy has evolved from a simple matter of safeguarding physical papers to a

complicated and multifaceted challenge as individuals battle with the digital footprint they leave

behind.
Cyber Security 4

Information Security Threats

The digital age has brought with it a variety of threats to personal privacy, many of which

arise from the very technology supposed to improve our lives. While computer systems and

networks have provided unprecedented ease and connectivity, they have also become breeding

grounds for potential privacy violations. Data breaches are one of the most serious threats, in

which cyber criminals gain unauthorized access to databases or systems and obtain important

information. Personal data, such as names, addresses, bank records, and even medical histories,

may be exposed as a result of these breaches. Notable examples include the Equifax data breach

in 2017, which compromised the personal information of 147 million people, and the Yahoo data

breaches, which affected billions of users (Payne, 2019). These events highlight the fragility of

personal information in the digital environment.

Cyberattacks are another serious danger to personal privacy. Malicious individuals or

groups frequently exploit vulnerabilities in computer systems and networks to get access to

sensitive information. Ransomware attacks, in which data is encrypted and kept hostage until a

ransom is paid, are becoming more common. An example of this is the WannaCry ransomware

attack in 2017 which disrupted systems all around the world, demonstrating the global reach of

such attacks (Kalita, 2017). Furthermore, phishing attacks, which scam individuals into

disclosing personal information, are widespread and becoming more sophisticated. These risks

make protecting privacy in the digital era an ongoing concern.

The rise of the Internet of Things (IoT) increases privacy challenges. Smart devices, from

thermostats to wearable fitness trackers, are continually collecting and transmitting data. While

these devices provide convenience and flexibility, they also open the door to breaches of privacy.

Recent examples have demonstrated how IoT devices can be used to spy on people or access
Cyber Security 5

their personal data. The rise of IoT highlights the importance of strong security measures to

protect personal privacy in an increasingly connected society (Kalita, 2017).

This dynamic threat landscape in the digital era necessitates a proactive approach to

personal privacy. Individuals and businesses must be attentive, putting in place security measures

and staying up to date on the latest threats and vulnerabilities (Kalita, 2017). These problems

highlight the changing nature of privacy in a world where the very technologies on which we

rely can endanger our personal information.

Role of Cryptography in Privacy and Public Safety

Cryptography serves as a double-edged sword in the field of privacy and public safety. In

one way, it is an important tool for keeping personal information safe and making sure that

communications are safe (Nielson & Monson, 2019). The use of encryption, the basic technique

used in cryptography. It ensures that data remains confidential and intact during transmission,

whether it's private conversations or sensitive financial information. This encryption allows

individuals to communicate and share data without fear of interception or unauthorized access,

thereby protecting their privacy. Furthermore, encryption is important for national security since

governments and corporations utilize it to protect confidential information, military

communications, and critical infrastructure.

However, the usage of encryption presents obstacles and problems for public safety. One

of the primary concerns is the potential for malicious actors to abuse encryption. Criminals and

terrorists can utilize encrypted communication to plan and coordinate unlawful operations in

complete secrecy (Nielson & Monson, 2019). Law enforcement agencies often encounter

difficulties in accessing encrypted data, as they may not possess the decryption keys. This
Cyber Security 6

conflict between privacy and public safety lies at the center of the encryption debate. It is a

complex and constant problem to balance the requirement for robust encryption to safeguard

personal privacy and secure communications with the necessity for law enforcement to access

data for criminal investigations. The trade-off is finding an equilibrium in which individuals may

protect their privacy while also ensuring that encryption does not become a barrier to unlawful

activity.

The challenge, then, is to achieve this balance. Many governments and security agencies

have campaigned for encryption backdoors or legal mechanisms that would allow them to access

encrypted data under certain conditions. Such techniques, however, can introduce vulnerabilities

and reduce the security of encryption systems (Nielson & Monson, 2019). As a result, it is

critical to navigate this sensitive situation, acknowledging cryptography's critical role in

protecting privacy and public safety while also addressing real concerns about its possible

misuse.

Policy Recommendations for a Networked World

The establishment and implementation of appropriate policies is critical in navigating the

complex environment of encryption, privacy, and public safety in the digital era. The first policy

that should be implemented should emphasize on standardization and certification of encryption

technologies, thereby promoting strong encryption that reduces the need for backdoors while

enhancing overall data security. Transparency and independent oversight policy that serves to

build trust between users and government agencies, ensuring that encryption backdoors are

accessed only under lawful and well-defined circumstances (Tamò-Larrieux, 2018). Clear data

access protocols policy to provide a structured approach for government agencies to access
Cyber Security 7

encrypted data for legitimate purposes, fostering a delicate balance between individual privacy

and the requirements of public safety.

International collaboration becomes indispensable in a world without digital borders,

harmonizing policies and facilitating consistent global regulations. The "privacy by design"

policy encourages proactive incorporation of privacy and security into technology development,

minimizing vulnerabilities from the outset (Tamò-Larrieux, 2018). Lastly, promoting public

awareness and education empowers individuals to make informed decisions, thereby securing

personal privacy and advocating for their rights. These policy recommendations create a

comprehensive framework to address the intricate challenges presented by cryptography in the

digital age, striking the right balance between individual rights and the necessities of public

safety.
Cyber Security 8

References

Blackburn, A., Chen, I., & Pfeffer, R. (2018). Emerging trends in cyber ethics and education.

IGI Global.

Edition, S. (2021). Summary - Targeted: The Cambridge Analytica whistleblower's inside story

of how big data, Trump, and Facebook broke democracy and how it can happen again

by Brittany kaiser. Shortcut Edition.

Holden, J. (2018). The mathematics of secrets: Cryptography from Caesar ciphers to digital

encryption. Princeton University Press.

Kalita, E. (2017). WannaCry ransomware attack: Protect yourself from WannaCry

ransomware: Cyber risk and cyber war.

Nielson, S. J., & Monson, C. K. (2019). Practical cryptography in Python: Learning correct

cryptography by example. Apress.

Payne, G. (2019). Equifax cybersecurity breach 2017: The human error: My personal story and

lessons learned.

Salomon, D. (2006). Coding for data and computer communications. Springer Science &

Business Media.

Tamò-Larrieux, A. (2018). Designing for privacy and its legal framework: Data protection by

design and default for the Internet of things. Springer.

You might also like