This is actually 2 separate essays, about one page per essay. The topics are:
1: Discuss the current state of cryptography in relation to mobile devices. What works, what doesn’t and what can be done to improve the field.
2: Discuss data loss prevention systems and the different sensors that are available.
Q1 Discuss the current state of cryptography in relation to mobile devices. What works, what doesn’t and what can be done to improve the field.
The ability to transmit sensible messages, while ensuring its confidentiality has been an essential requirement for the modern man. As such, a secure communication has constantly been the human desire, thus cryptography became the tool that guarantees it (Neidhardt 9). In mobile devices, the accurate mobile data encryption techniques can assist IT, as well as mobile users, to secure sensitive corporate information on mobile devices. One modern approach secures mobile data by storing it in the remote cloud leveraging cryptographic techniques with negligible performance degradation (Sujithra, Padmavathi and Narayanana).
Primarily, smart-phones have certain security mechanism primed to deal with unauthorized access to critical and private data. For instance, password based protection, where users assign passwords to critical files and data. Based on correct or incorrect password, access or denial of access to mobile data is granted. One major setback, however, is that passwords can easily be seen and memorized by others. This is the same for security patterns. Thus, the encryption algorithm is most frequently used practice to safeguard data within a cloud environment, where client data can either be categorized as private or public data (Sujithra, et al.). Since in present and older techniques cryptographic algorithms are deployed in a single system environment, future works will leverage the availability of high performance computing techniques, to apply similar and more advanced algorithms to local as well as cloud environments. Sujithra, et al’s study indicates increased efficiency in data security on these environments. Nonetheless, other performance measures, such as turn-around time alongside throughput, are scheduled to be incorporated in future works.