From the course: Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Cert Prep by Microsoft Press

Unlock this course with a free trial

Join today to access over 24,000 courses taught by industry experts.

Describe encryption and hashing

Describe encryption and hashing

- Understanding security and compliance concepts. Describe encryption and hashing. Encryption and hashing are two important security technologies used by Microsoft to protect data and systems from unauthorized access and tampering. Encryption is the process of converting plain text data into something that appears to be random and meaningless, ciphertext. The encryption process requires an algorithm and a key. The algorithm defines how data is transformed from plain text into ciphertext, and back into plain text. A key is a random string of data used to input into the algorithm. All of the security of the process is contained within the key. There are two types of encryption. Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different but mathematically related keys to perform encryption and decryption. Encryption is the process of converting data into a…

Contents