Supporting Security Objectives and Requirements with Cryptography and Public Key Infrastructure (PKI)
This chapter covers the following topics:
Privacy and Confidentiality Requirements: This section covers issues related to ensuring the privacy of personal and other proprietary data types.
Integrity Requirements: This section describes best practices for ensuring that unauthorized changes are not made to data.
Non-repudiation: This section covers the purpose of and benefits provided by the cryptographic technique non-repudiation.
Compliance and Policy Requirements: This section stresses the importance of aligning corporate policy with regulatory compliance.
Common Cryptography Use Cases: This section discusses data at rest, data in ...