O'Reilly logo

Cyber Security and IT Infrastructure Protection by John R. Vacca

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13

Fundamentals of Cryptography

Scott R. Ellis, EnCE, RCA, RCIA,    kCura Corporation

This chapter discusses how information security is the discipline that provides protection of information from intrusion and accidental or incidental loss. It also provides a framework for the protection of information from unauthorized use, copying, distribution, or destruction of data. Cryptography plays a key role in supporting the protection of captured data from prying eyes. It does nothing to actually protect the encrypted data from being intercepted.

Keywords

cryptography; encryption; privacy; physical security; logical security; ranking; risk; protocols; audits; confidentiality; integrity; availability; block ciphers; algorithms; cryptographic ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required