O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Uses of Cryptography in Information Security

  • Identify key issues of cryptography and be able to explain basic cryptographic methods in use today.

    • Recognize the characteristics of encryption.

The original purpose of cryptography was secrecy—the ability to communicate with the assurance that, if the communication were intercepted by someone other than the intended recipient, it would not be readable or usable.

Data that is stored in digital form is easy to copy and “steal”—without the owner being aware that it's been taken. Data that travels across a network—especially a public network such as the Internet—is vulnerable to interception at any point along the way from the sending to destination computer. Unless we want all our network communications ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required