O'Reilly logo

Information Technology Security Fundamentals by Bryan Hosack, Glen Sagers

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 6

Cracking the Code (Cryptography)

This chapter is likely the most technical chapter of the book, but it is absolutely necessary for a manager to understand how encryption works, at least at basic levels. Knowing how encryption works will ensure that the manager understands which security problems can be solved by encrypting data. Typically, for example, we think of cryptography as ensuring only the confidentiality of information, but as we will see, it can help fulfill at least two of the three tenets of the CIA triad.

From a managerial standpoint, not only does encryption protect our data, but it’s also required for compliance with many current regulations. PCI DSS (Payment Card Industry Data Security Standard), for example, requires ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required