Chapter 1. Security and Cryptography Concepts

Learning Objectives

After studying this chapter, you should be able to:

  • Describe the five main security objectives

  • Explain the main uses of cryptography

  • Describe four types of cryptographic algorithms

  • Understand the concept of public-key infrastructure

Essential to understanding the concept of information privacy is an understanding of information security. As described in Chapter 2, “Information Privacy Concepts,” there are areas of overlap as well as areas of nonoverlap between these two fields. This book provides numerous examples of privacy management, design, and technology concepts that require the use of the corresponding security concepts. This chapter provides a brief overview of information ...

Get Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.