Chapter 1. Security and Cryptography Concepts
Learning Objectives
After studying this chapter, you should be able to:
Describe the five main security objectives
Explain the main uses of cryptography
Describe four types of cryptographic algorithms
Understand the concept of public-key infrastructure
Essential to understanding the concept of information privacy is an understanding of information security. As described in Chapter 2, “Information Privacy Concepts,” there are areas of overlap as well as areas of nonoverlap between these two fields. This book provides numerous examples of privacy management, design, and technology concepts that require the use of the corresponding security concepts. This chapter provides a brief overview of information ...
Get Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.