From the course: IT Security Foundations: Operating System Security
Unlock the full course today
Join today to access over 24,000 courses taught by industry experts.
Cryptographic techniques
From the course: IT Security Foundations: Operating System Security
Cryptographic techniques
- [Instructor] Cyber attacks propagate the news on a daily basis. Report surface on attacker stealing terabytes of sensitive information, personal data and compromised emails. Stealing company information and trade secrets is a well-known challenge that businesses strive to protect against. However, it can go undetected. As many times companies don't notice any abnormal network activity. We use cryptographic techniques to ensure confidentiality, integrity, and authentication of data whether in motion or at rest. Data is in motion while traveling through the network moving from place-to-place. Data is at rest while on a drive, cloud storage or removable media. Today, encryption is the most effective way to secure digital data. Encryption uses a mathematical algorithm, and a key to convert data into a scrambled format, which is meaningless unless you have a key. As we discuss cryptography, you'll hear many…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.