O'Reilly logo

CISSP For Dummies, 4th Edition by Peter Gregory, Lawrence Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8

Cryptography

In This Chapter

arrow Unlocking cryptography and its alternatives

arrow Understanding the differences between symmetric and asymmetric key systems

arrow Getting a grasp on what keys are and how to use them

arrow Keeping online information secure by using cryptography

arrow Knowing how the bad guys can attack an encryption system

This is the part where Good Will Hunting meets the Rain Man and A Beautiful Mind. If solving long, complex, theoretical math problems on windowpanes isn’t your forte, you’ll probably want to read this chapter slowly and carefully — then perhaps read it again.

Cryptography (from the Greek kryptos, meaning hidden, and graphia, meaning writing) is the science of encrypting and decrypting communications to make them unintelligible for all but the intended recipient.

remember.eps The Certified Information Systems Security Professional (CISSP) candidate must have a thorough understanding ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required