From the course: IT Security Foundations: Operating System Security

Unlock the full course today

Join today to access over 24,000 courses taught by industry experts.

Cryptographic techniques

Cryptographic techniques

- [Instructor] Cyber attacks propagate the news on a daily basis. Report surface on attacker stealing terabytes of sensitive information, personal data and compromised emails. Stealing company information and trade secrets is a well-known challenge that businesses strive to protect against. However, it can go undetected. As many times companies don't notice any abnormal network activity. We use cryptographic techniques to ensure confidentiality, integrity, and authentication of data whether in motion or at rest. Data is in motion while traveling through the network moving from place-to-place. Data is at rest while on a drive, cloud storage or removable media. Today, encryption is the most effective way to secure digital data. Encryption uses a mathematical algorithm, and a key to convert data into a scrambled format, which is meaningless unless you have a key. As we discuss cryptography, you'll hear many…

Contents