Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)SP B Week 04 Lesson 09 Discussion

#100174
Jacob Mannon
Participant

Cryptography is incredibly valuable because it allows for us to take data and hide it while it is moving from one place to another. The value is that it is scrambled or moved around and then sent to its destination where it can then be turned back into its original message. The point of this is to help prevent attackers from stealing data from the network while it is in transit. The main types of encryptions are symmetric, asymmetric, and data hashing. The differences are that symmetric will use the same key that was used to encrypt the message to decrypt it. Asymmetric encryption will require two different keys to decrypt the data. Hashing is where a piece of data is put through an algorithm and is then sent to its destination.

-Jacob

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.