Discipline: Computer Science, Information Technology
With the growth of the information technology (IT) power, and with the emergence of new technologies, the number of threats a user is supposed to deal with grew exponentially. The objective is to make a message encrypted with state of the art software virtually impossible to decode without a key. This research is intended for security matters, which answers the issues of confidentiality, authorization, non repudiation and integrity. With a hacker attack, you simply have to keep them out of the data, with a legal attack, you have to hide the existence of the data, as the legal system has at their disposal an additional channel for getting the data, they can subpoena it and demand you to disable any protective measures and hand over the data. The results of the study showed that with the development of audit trail this becomes more promising in terms of security. Users are now updated with the files that are being sent and received by them. It also provided an easy access in transmitting confidential reports. The confidentiality and integrity of transmitted data are secured, and the authorization of the user to perform task is fully ensured and files are being transmitted, non-repudiation occurs.