December 2019
Intermediate to advanced
500 pages
16h 2m
English
Learning Objectives
After studying this chapter, you should be able to:
Describe the five main security objectives
Explain the main uses of cryptography
Describe four types of cryptographic algorithms
Understand the concept of public-key infrastructure
Essential to understanding the concept of information privacy is an understanding of information security. As described in Chapter 2, “Information Privacy Concepts,” there are areas of overlap as well as areas of nonoverlap between these two fields. This book provides numerous examples of privacy management, design, and technology concepts that require the use of the corresponding security concepts. This chapter provides a brief overview of information ...