Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 22 - Encryption, Protocols and Digital Certificates - Coggle…
Chapter 22 - Encryption, Protocols and Digital Certificates
Encryption
the encoding of data so it cannot be read directly
Plaintext:
original message
Ciphertext:
encrypted message
Encryption:
process of converting plaintext to ciphertext
Key:
used for scrambling and unscrambling data
Encryption Algorithm:
formula for encrypting plaintext
Encryption is
strong
when the useful time of encrypted datas is les than the time taken to break the code
Types of Encryption
Symmetric encryption
(Private Key Encryption)
the same key is used to both encrypt and decrypt data
the key is only known by the sender and the reciever
however
if a hacker discovers the key, they can decrypt messages without being detected
Asymmetric encryption
(End-to-End Encryption)
more secure that
symmetric encryption
has two separate keys;
Public Key:
available to anyone wishing to send an encrypted message
Private Key:
only available to the recipient, decrypts the message
Protecting Stored Data
must be protected by law
increased use of latops and mobile devices increases the risk to data
more easily stolen or lost
Utility Software
will encrypt hard drives and external storage devices preventing unauthorised access
Protecting Data during Trans- mission
Protocols
Protocol:
set of rules to communicate between devices
in a network, a standardised set of rules has been devised, covering standards for
physical connections, cabling, transmission modes, speed, data format, error detection and correction
HTTP:
standard protocol used to access and recieve web pages in the form of HTML files on the internet
Secure Links
HTTPS:
secure data transmitted between a user and a website
SSL:
establishes an
encrypted link
between a web server and a user.
ensures communications and online transactions with their customers cannot be intercepted
a certificate containing the domain name, company name, address and country to authenticate secure sites
TLS:
newer version of
SSL
, performs similar function
a digital certificate
authenticates secure websites
Wireless Security Standards
WEP
(Wired Equivalent Privacy)
& WPA
(Wi-Fi Protected Access)
prevents access to hackers
encrypt data to prevent it from being understood
WPAv2 is the latest and most secure standard for wireless transmission