Comparing Encryption Methods

Chapter 1, “Understanding Core Security Principles,” introduced the security triad of confidentiality, integrity, and availability. Confidentiality ensures that unauthorized individuals aren’t able to access data. One of the methods used to prevent the loss of confidentiality is encryption.

Encryption scrambles data so that unauthorized users are unable to read it. There are many different types of encryption protocols and algorithms in use; you’ve already read about several of them in this book. For example, Chapter 8, “Understanding Wireless Security,” provided a short introduction to encryption. As a reminder, most encryption includes an algorithm and a key. The algorithm provides a mathematical formula that identifies ...

Get Microsoft® Windows® Security: Essentials now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.