Cryptography in Cyberwar
Now that you have a basic understanding of the underlying concepts and technologies used in cryptographic systems, you can look at their uses in computer network defense and computer network attack scenarios.
Computer Network Defense and Cryptographic Systems
The strategies and technologies used in computer network defense are typically the same types of technologies used in a traditional information security defense-in-depth plan. Layers of defensive encryption-based technologies are deployed to ensure that data are exposed as little as possible and to make sure that keys are properly protected. Among these technologies are the following:
Drive encryption is encryption either for full drives or for volumes (drive ...
Get Cyberwarfare: Information Operations in a Connected World, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.