O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7.  Day 7 – Security Engineering - Cryptography

This chapter gives an overview of cryptography, its requirements, concepts, application, attacks, and management using a high-level illustration. Understanding and applying cryptography and its use in preserving the confidentiality and integrity of sensitive assets as well as attacks on cryptographic systems and cryptographic standards are some of the main topics covered in this chapter.

An overview of cryptography

Sensitive assets need protection from unauthorized disclosure or tampering. The sensitivity of assets is determined by confidentiality and integrity requirements and the impact of compromise on the corporation or national security. Cryptographic methods and solutions provide assurance ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required