10.4 Cryptographic Uses

Now that we are familiar with cybersecurity concepts and some of the basics of cryptography as ways to defend against threats to information from interception as it transits from point-to-point, or as it is stored on host platforms or laptops, or even mobile phones, we will turn our attention to understanding some uses of cryptography. Also, we will elaborate further on how virtual private networks (VPNs) operate. Earlier, we hinted at cryptography and network security protocols such as IPSec. Cryptography can appear at many layers of the network stack, depending on what and how much information must be secured. At the network layer, for example, we can use IPSec. At the transport layer, we can use Transport Layer Security ...

Get Information Security Management, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.