Built-in Security Mechanisms
Navigation:
Find Password Protected
Files > Built-in Security Mechanisms
Assume that we need to encrypt some private information (e.g. correspondence, budget planning, business data, creative ideas, etc.) If possible loss because of breaching confidentiality has mainly moral aspects it will be quite enough to use built-in security mechanisms that both most common archivers (e.g. zip) and text editors (e.g. MS Word, Adobe Acrobat) have. In most cases it's quite enough to select a required option, for example, To encrypt a file, etc.
While this way is the most low-expensive it doesn't provide high reliability, because it is based on use of simple encryption algorithms, the keys of small size. To provide better security users are recommended to use lengthy passwords (over 6 symbols), and combine numbers, lowercase and capital letters.
In other cases, when importance of keeping data confidential covers additional costs it may be recommended to use special encryption software.
YOUR FEEDBACK
Please, let us know what you
think about this article:
|