This chapter is all about cryptography which is the process
of converting plaintext (readable) into ciphertext (unreadable). This process
has been around for centuries. The text goes through a brief chronological sequence
of the high points as it cryptography evolved. It is important to understand
Symmetric and Asymmetric algorithms. Symmetric algorithm uses one mathematical
key to encrypt and to decrypt, whereas Asymmetric uses two mathematical keys to
encrypt and to decrypt. The book has several pages on understanding
cryptography attacks and some possible safeguards to help thwart off attackers.
The chapter goes into much detail about protecting data as
travels a network. It provides the security professional with many tools as
well as areas to be concerned about. I found the chapter to be very informative
along with much insight.
No comments:
Post a Comment