Skip to Content
Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices
book

Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

by William Stallings
December 2019
Intermediate to advanced
500 pages
16h 2m
English
Addison-Wesley Professional
Content preview from Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

Chapter 1. Security and Cryptography Concepts

Learning Objectives

After studying this chapter, you should be able to:

  • Describe the five main security objectives

  • Explain the main uses of cryptography

  • Describe four types of cryptographic algorithms

  • Understand the concept of public-key infrastructure

Essential to understanding the concept of information privacy is an understanding of information security. As described in Chapter 2, “Information Privacy Concepts,” there are areas of overlap as well as areas of nonoverlap between these two fields. This book provides numerous examples of privacy management, design, and technology concepts that require the use of the corresponding security concepts. This chapter provides a brief overview of information ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Privacy, Regulations, and Cybersecurity

Privacy, Regulations, and Cybersecurity

Chris Moschovitis

Publisher Resources

ISBN: 9780135278383