Chapter 8
Data and the System
This chapter covers the following topics and corresponding proficiencies:
Data security: Understand the methods used to protect data from being altered or disclosed in an unauthorized way or by an unauthorized user.
Encryption: Understand the types of encryption and the ways they are used to protect data in storage and in transit.
Hashing: Differentiate between encryption and hashing and describe the uses of hashing in information assurance.
Non-repudiation: Differentiate between encryption and non-repudiation and understand the purpose of non-repudiation in information assurance.
Authentication: Understand the need for authentication, the authentication process, the types of authentication factors, and some methods ...
Get CC Certified in Cybersecurity Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.