CHAPTER 9Cryptography and the Public Key Infrastructure
Objectives
Upon completion of this chapter, you will be able to answer the following questions:
How is cryptography used to secure communications?
What is the role of cryptography in ensuring the integrity and authenticity of data?
How do cryptographic approaches enhance data confidentiality?
What is public key cryptography?
How does the Public Key Infrastructure function?
How does the use of cryptography affect cybersecurity operations?
Key Terms
This chapter uses the following key terms. You can find the definitions in the Glossary.
Get CCNA Cybersecurity Operations Companion Guide, First Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.