Categories
Cybersecurity

CRYPTOGRAPHY

We have to protect information and data at rest, while processing and in transit, all this also for nonrepudiation.
Encryption data is the best way at rest, for example in Oracle and Informix we can alter table containing personal data with the option encrypted using a cypher 512 bit AES, or there are many free tool (veracrypt) to encrypt HD partition where we can save any kind of file.
In transit, that is while data are transmit and in Pila ISO/OSI we are at 3 layer
we have to use security protocols like HTTPS, sftp, ssh, SSL/TLS, IPSec .
While processing we have to be warn that nobody is back our shoulder while treating personal data.
An example of Cryptography is that invented in 1993 by activist Phil Zimmerman [23] with twist key public and private, called PGP, Pretty Good Privacy.
(From RSA= Rivest Shamir Adlman : asymmetric cryptography with public key)

Cybersecurity
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.