Article Review II

docx

School

Liberty University *

*We aren’t endorsed by this school

Course

612

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by PresidentFire53

Report
Running head: ARTICLE REVIEW II 1 Article Review II Loaze-Noha Ngassaki Ikounga Ongania Liberty University CSCI 612 February 03, 2024
Running head: ARTICLE REVIEW II 2 Article Review II Introduction The evolution of technology within the world of cybersecurity is constantly affecting the importance of more advanced securing methods or practices to aid in the security of systems such as quantum computing. The article titled “Systems Security Affectation with the Implementation of Quantum Computing,” authored by Novoa Torres, Juan Carlos Suarez Garcia, and Erik Alexis Valderrama Guancha, delves into the profound implications of quantum computing on existing cryptographic systems. Quantum Computing as a whole provides more advanced processing capabilities but it also poses risks to the cryptographic frameworks that secure digital information. This review will assess the authors point of view and insights on the subject as well as explore the integration of a Biblical concept in tackling this more advanced security . Authors Objectives Analyze the impact of quantum computing on current encryption methods. Explore quantum computing cryptographic systems and their potential to enhance data security. Highlight the necessity for transitioning to quantum-resistant cryptographic algorithms to safeguard against quantum computing threats. Discuss the implications of quantum computing advancements on the broader field of information technology, emphasizing the balance between innovation and security. Research Objectives Assess the validity and comprehensiveness of the proposed quantum cryptographic models and their practical applicability. Investigate the readiness of current cybersecurity infrastructures to adapt to quantum computing advancements. Examine the ethical and societal implications of quantum computing on data privacy and security. Research Questions 1. How will the transition to quantum-resistant cryptographic systems impact the overall architecture of global information security frameworks? 2. What ethical considerations emerge from the potential misuse of quantum computing in the context of privacy and data protection? 3. To what extent can biblical principles of stewardship and integrity guide the development and implementation of quantum computing technologies in securing data? Narrative This review dives into the extraordinary capability of quantum figuring as illustrated by Torres, Garcia, and Guancha, featuring the double idea of quantum progressions as both a shelter
Running head: ARTICLE REVIEW II 3 and a curse for online protection. The creators convincingly contend that while quantum figuring offers uncommon open doors for secure information encryption, it at the same time takes steps to deliver customary cryptographic techniques old. The conversation on quantum cryptographic models, for example, Quantum Key Circulation (QKD) and the calculations by Peter Shor and Grover, gives a brief look into the future of secure communications. Nonetheless, the review likewise brings up the need for a more detailed exploration of the transition strategies for existing systems to quantum-resistant frameworks, addressing the gap between theoretical models and practical implementation challenges. Conclusion In their article, Torres, Garcia, and Guancha present a convincing argument for the urgent need to develop and implement quantum-resistant cryptographic systems by critically examining the relationship between quantum computing and system security. While recognizing the capability of quantum registering to change information security, this survey highlights the significance of proactive measures to forestall quantum processing from turning into a device for sabotaging worldwide data security. It requires a cooperative exertion among scientists, industry experts, and policymakers to address the difficulties presented by quantum progressions, guaranteeing a safe change to the following time of figuring innovation. Biblical Support of Review The advent of quantum computing and its impact on systems security can be reflected upon through the lens of biblical principles, particularly those of stewardship and integrity. As stewards of technology, cybersecurity professionals are called to manage and protect the digital assets entrusted to them, akin to the parable of the talents (Matthew 25:14-30). This parable highlights the importance of responsibly using the resources and talents we are given, suggesting that embracing quantum computing's potential while safeguarding against its risks is an exercise in prudent stewardship. Integrity, as emphasized in Proverbs 11:3, "The integrity of the upright guides them, but the unfaithful are destroyed by their duplicity," speaks to the ethical deployment of quantum computing. As researchers and professionals explore the bounds of quantum technology, maintaining integrity ensures that advancements are made with consideration for privacy, security, and the common good, preventing the misuse of such powerful capabilities.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Running head: ARTICLE REVIEW II 4 References Ashok, P., Ragunthar, T., James, T. P. G., Sahayaraj, K. K. A., Suganthi, P., Somasundaram, K., & Ananthi, S. (2023). Empowering an IoT platform with  advance quantum computing and a Customized deep residual technique. Optical and Quantum Electronics, 55 (10)https://doi.org/10.1007/s11082-023-05154-4 Basta, A. (2023). Security engineering. McGraw-Hill Custom. El-Aziz, R. M. A., Rayan, A., Shahin, O. R., Elhadad, A., Abozeid, A., & Taloba, A. I. (2021). Modified deep residual quantum computing optimization technique for IoT platform. International Journal of Advanced Computer Science & Applications, 12 (12)https://doi.org/10.14569/IJACSA.2021.0121244 Lin, H. (2023). The mother of all data breaches: Quantum computing holds new promises and dangers. such devices could overturn our whole cybersecurity regime, revealing not just mountains of data but secrets from years past. Hoover Digest, (1), 79. Norberto, N. T., Suarez Garcia, J. C., & Erik Alexis, V. G. (2021). Systems Security Affectation with the Implementation of Quantum Computing. International Journal of Advanced Computer Science and Applications, 12 (4)https://doi.org/10.14569/IJACSA.2021.0120405 Possati, L. M. (2023). Ethics of quantum computing: An outline. Philosophy & Technology, 36 (3), 48. https://doi.org/10.1007/s13347-023-00651-6 Shamshad, S., Riaz, F., Riaz, R., Rizvi, S. S., & Abdulla, S. (2022). An enhanced architecture to resolve public-key cryptographic issues in the internet of things (IoT), employing quantum computing supremacy. Sensors (Basel, Switzerland), 22 (21), 8151. https://doi.org/10.3390/s22218151 WEBER, K. (2022, March 1). Cybersecurity and ethical, social, and political considerations: When cybersecurity for all is not on the table – doaj . Humanities and Social Sciences. https://doaj.org/article/2e7a4bf21e734b6984ce93cdcd75a51c New International Version. (2011). Holy Bible: N.I.V. New international version.