O'Reilly logo

Computer Security Fundamentals, Second Edition by William Easttom

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Encryption

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

• Explain the basics of encryption

• Discuss modern cryptography methods

• Select appropriate cryptography for your organization

• Understand the function and protocols of UPNs

Introduction

There are many aspects of computer and information security. Encryption, the process of scrambling a message or other information so that it cannot be easily read, is one of the most critical parts to the security puzzle. If you have the best firewall, very tight security policies, hardened operating systems, virus scanners, intrusion-detection software, antispyware, and every other computer security angle covered but send ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required