Domain 5, “Cryptography”
Uses of Cryptography
Cryptography can be used for many purposes. The following are several primary uses:
Confidentiality— Preventing, detecting, or deterring unauthorized access to information. Confidentiality of information can be obtained through both symmetric and asymmetric encryption.
Integrity— Preventing, verifying, and detecting the alteration of data or information you have sent. Hash algorithms are typically used to provide for integrity of information.
Authentication— Identifying an individual or verifying that the individual is part of a certain group. You typically can authenticate someone based on one of three attributes:
Something the person knows, such as a password
Something the person has, such as a token ...
Get CISSP Training Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.