Ethical considerations are becoming issues most so, with advancement in technological level today. Peoples’ privacy and confidentiality has been interrupted through various ways with the help of ICT. Through the social media and other interactive computer systems for instance, conversations as well as transactions are eavesdropped by outside parties including the government for instance if they are suspecting something weird with a conversing party without their permission. This scenario thus reveals how today with the assist of technology, peoples’ privacy and confidentiality has been interrupted.

In order to ensure that conversation or transactions between two or more parties are ethically transmitted without issues of privacy, various systems and applications have encrypt their systems to enhance an end to end contact encryption. This is where by the form of conversation is only understandable by the sender and the receiver and an outside party cannot be allowed or if forcefully eavesdrop will not understand the language.  Encryption is enhanced through converting some data into a certain code only understandable by the authorized users of the system or application. Depending on the size of the system, the number of users, and the tasks it is supposed to perform, encryption might varySystem encryption is therefore done depending on the level of privacy or confidentiality of the users.

According to Attrapadung (a computer science writer at essaymojo.com), there are three main and commonly known levels of system encryption depending on the level of privacy and confidentiality the content of the system is. These are; the single bolt lock, double bolt lock and triple bolt lock. Order of complexity rises with the number of bits packaged and its speed. A single bolt lock appears to be the most fast of the three encryption level in terms of packaging data as well as unpacking. It is however the least in terms of robustness and it is most valid in the systems where not much personal information is conveyed for instance download registrations. This level of encryption uses mainly xxTEA-128 bit encryption. The second level of encryption, double bolt lock encryption uses EAS- 128 bit encryption is mostly used to protect one’s privacy on social Medias. It helps to protect a person’s confidentiality when visiting public sites. The highest level of encryption, triple block encryption uses EAS – 256 bit encryption is the most complicated level of encryption used mostly by the United States government urgency and according to research it would take more than 100 million years for hackers to crack into a system encrypted with the above level. Various factors will therefore determine what kind or level of encryption will be selected and used for a given system. Top government management system for instance, might need a triple black encryption in order to maintain the confidentiality and various ethical considerations of the users. There are as well other level of encryptions like column level and cell level encryption which are used to encrypt data base system.

Read Also :   History of Apple Apple Logo: Before and Now

Is encryption absolute?

Encryption of most systems is to an extent absolute for instance in organization, alongside resource sharing, there might be a need to share data an information which is difficult in an organization that uses totally encrypted systems to manage their operations. The human nature as well makes encryption a very challenging technology to adopt in order to maintain a person’s or organizations confidentiality. People tend to share information by nature thus the entire encryption process might not be trusted fully most so in organizations dealing with top most secrets. This thus still leaves encryption for privacy and confidentiality not absolute. These, alongside other factors like code misinterpretation and misunderstanding among the users still proves encryption a challenging invention to adopt when using the encrypted systems.

 Does encryption do more good than harm?

Ethically, every citizen is entitled to his or her own privacy and boundaries that is not to be intruded. There are policies that emphasizes on peoples’ privacy and confidentiality when it comes to data and information sharing. Encryption of some of the systems that people commonly use like watsapp application and other social media systems has helped control the issues of eavesdropping and information leakage. This thus has done more good than harm. In terms of organization, encryption of management systems has helped to ensure confidentiality as it has controlled the rate of data loss and improved the level of data and information security. Issues of information leakage have also been minimized by encryption of systems in organizations. Government urgencies also have been able to maintain top secret government information from hackers whose leakage might lead to a nationwide panic through the storing them in such encrypted information management systems. All the above reasons reveal that indeed encryption has done more good than harm both to individuals, organizations and even the government.

Read Also :   Hardware vs. software keylogger – How do they work and which one’s best for monitoring