1. 2.3 ENCRYPTION TECHNOLOGY
1.1. Cryptographic Terminologies
1.1.1. Encryption
1.1.1.1. Method of transforming plain text into an unreadable format
1.1.2. Cipher Text
1.1.2.1. The scrambled format of data after being encrypted
1.1.3. Decryption
1.1.3.1. Method of obtaining the encrypted message back to its original form
1.1.4. Cryptanalysis
1.1.4.1. Art of finding some weakness and insecurity in a cryptographic scheme
1.2. Common Communication Encryption Types
1.2.1. Hash Encoding
1.2.1.1. Hash encoding, or hashing, ensures that messages are not corrupted or tampered with during transmission.
1.2.2. Symmetric Encryption
1.2.2.1. Requires both sides of an encrypted conversation to use an encryption key to encode and decode the data.
1.2.3. Asymmetric Encryption
1.2.3.1. Requires two keys, a private key and a public key.
1.2.3.2. The public key can be widely distributed, including emailing in clear text or posting on the web.
1.2.3.3. The private key is kept by an individual and must not be disclosed to any other party. These keys can be used in two ways.
2. Security Policy
2.1. A security policy is a written document that states how an organization plans to protect the company’s information technology assets
2.2. Security Policy Requirements
2.2.1. When developing a security policy for the first time, one useful approach is to focus on the why, who, where, and what during the policy development process.
2.3. Usernames and Password
2.3.1. A username and password are two pieces of information that a user needs to log on to a computer.
2.4. Password Requirements
2.4.1. When assigning passwords, the level of password control should match the level of protection required.
2.5. File and Folder Permission
2.5.1. Permission levels are configured to limit individual or group user access to specific data.
3. 2.2 SECURITY PROCEDURES
3.1. Procedures are detailed step-by-step tasks that should be performed to achieve a certain goal.
3.2. Data Protection
3.2.1. Software firewalls, biometrics and smart cards, data backups and data encryption are some of the approaches that we can take to protect our data.
3.2.2. Software firewalls
3.2.2.1. A software firewall is a program that runs on a computer to allow or deny traffic between the computer and other computers to which it is connected.
3.2.3. Biometrics and Smart Cards
3.2.3.1. Biometric security compares physical characteristics against stored profiles to authenticate people.
3.2.3.2. A smart card is a small plastic card, about the size of a credit card, with a small chip embedded in it.
3.2.4. Data Backups
3.2.4.1. A data backup stores a copy of the information on a computer to removable backup media that can be kept in a safe place.
3.2.5. Data Encryption
3.2.5.1. Encryption is where data is transformed using a complicated algorithm to make it unreadable.