|

References

Harmon, P. (2022). Data breach notification laws and the quantum decryption problem. Washington and Lee Law Review, 79(1), 475-519. Retrieved from http://mutex.gmu.edu/login?url=https://www.proquest.com/scholarly-journals/data-breach-notification-laws-quantum-decryption/docview/2681520533/se-2
This citation is helpful because it is talking about encryption technologies and some information disclosed. It can be caused losses. Also, many people start to use internet to trade, there is possible to cause their identity be theft. That may use their information to their money or something important.

Joachim, D. (1997). Hardcore security -- chip-level implementation bolsters encryption technology for electronic commerce. Communications Week, (646), 1. Retrieved from http://mutex.gmu.edu/login?url=https://www.proquest.com/trade-journals/hardcore-security-chip-level-implementation/docview/226888362/se-2
This citation is helpful because it is talking about a lot of risks and encryption technology in the field of electronic commerce. Also, encryption technology may be directly embedded into hardware and chips or core of PCs.

Santa Clara University. (2018). Ethical Questions About Encryption. Retrieved September 13, 2022, from @SantaClaraUniv website:https://www.scu.edu/ethics/focus-areas/technology-ethics/resources/ethical-questions-about-encryption/
This citation is helpful because it is talking about some ethical questions about encryption in many aspects. One hand is that some people think that encryption also allow criminals to communicate securely. On the other hand, encryption can protect people’s information and prevent hackers from internet. Some people think encryption can do more good than harm.

Managing information security risks: Sivarama krishnan writes about how organizations can go about handling risk in the era of cloud computing.(2011). Express Computer, Retrieved from http://mutex.gmu.edu/login?url=https://www.proquest.com/trade-journals/managing-information-security-risks/docview/873627573/se-2
This citation is helpful because it is talking about some security risks, understanding the security risks and how to prevent. Also, Evaluating the effectiveness of a security program and try to avoid risks and hackers.

Gellis, H. C. (2004). Proctecting against threats to enterprise network security: Certified public accountant. The CPA Journal, 74(7), 76-77. Retrieved from http://mutex.gmu.edu/login?url=https://www-proquest-com.mutex.gmu.edu/scholarly-journals/proctecting-against-threats-enterprise-network/docview/212320978/se-2
This citation is helpful because it is talking about some threats to enterprise network security, On the contrary, it tells us the importance of encryption technology. Internet changes people’s life. Information security become more serious. So, how to make protect against threats become more and more important.

Smid, M. E. (2021). Development of the advanced encryption standard. Journal of Research of the National Institute of Standards and Technology, 126, 1-18. doi:https://doi.org/10.6028/jres.126.024
This citation is helpful because it is talking about cryptographic algorithms. Strong cryptographic algorithms are essential for the protection of stored and transmitted data throughout the world.

Lina Gong, Li Zhang, Wei Zhang, et al. The application of data encryption technology in computer network communication security. AIP Conference Proceedings 1834, 040027 (2017); https://doi.org/10.1063/1.4981623
This citation is helpful because it is talking about Symmetric key encryption technology and Asymmetric key encryption technology. Also, it’s talking about encryption and decryption and how it works. Some more advanced algorithm design make data more security.

Website Media Reference

Picture reference:https://www.imperva.com/learn/data-security/data-encryption/

My Blog

  1. website link: https://yuanbz.blogspot.com/