IT Security Technologies Name: Institution: Course: Date: IT Security Technologies Technology plays a subtle part in individuals’ lives and organizations alike (Schneier, 2012). People and organizations are both able to share and store important information that is sensitive, which they can access from anywhere in the world and using different platforms that exist (Perlman, 2004). With the rise of technology, hackers and malicious persons have also been on the rampage using the internet to make personal, political, social and economic scores. Issues such as identity theft and corporate/industrial/economic espionage (Gnupg.org, 2015).Cryptography has become one crucial science in the IT sector, for the individuals and organizations. Cryptography dates back to the 1900 B.C. and can be traced to Egypt, where an Egyptian had used hieroglyphs which were not st
...