Learning about Encryption, Encoding, and Hashing

Learning about Encryption, Encoding, and Hashing



Photo by Markus Spiske on Unsplash

BASIC INTRODUCTION


We no longer live in the 90s when the internet was just accessible to people. With the amount of information that is available and the sheer number of tools available to aid exploitation of vulnerabilities, it is necessary to implement proper security controls.


It is necessary to implement proper security mechanisms to not only the data stored at rest but also in transit. All it takes is a network sniffer to lose the confidentiality of the data.


Often passwords and security keys are transmitted over the network. If they get in the wrong hands, the attackers can compromise the integrity of the data or knock the systems online. Thus, affecting the availability of the data and the systems.


< ..

Support the originator by clicking the read the rest link below.