Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)SP B Week 04 Lesson 09 Discussion

#100193
Latoya Stoudmire
Participant

Cryptography Methodologies are essential to every company using Internet accessible devices. There are several different types of methodologies used in cryptography. Each type of encryption should be used for specific scenarios. Some of the most common types of encryptions are asymmetric encryption, symmetric encryption, Data encryption standard and advanced encryption standard. These encryptions alongside algorithm’s facilitate the protection of our data. When trying to encrypt large bulks of data or protecting payment information in the form of credit cards, companies typically use symmetrical encryptions. Symmetric encryption allows the system to move faster than asymmetric when trying to process information at higher speeds. Symmetric encryption allows safety of the data using a one key encryption. Symmetric encryption requires the same key used to encrypt the message also be used to decrypt the message. The message is sent using permutations. Using the same key for encrypting and decrypting can cause potential security risk as explained in article from Key Factor “people (or technology) who want to correspond via symmetric encryption must share the key to do so, and if the channel used to share the key gets compromised, so does the entire system for sharing secure messages since anyone with the key can encrypt or decrypt those communications.” When to use symmetric encryption vs. asymmetric encryption (2023) When security is a top priority and time constraints are not as huge of an issue asymmetric encryption is used. Asymmetric encryption provides more security than symmetric. With asymmetric encryption two distinct types of permutations are used whereas with symmetrical encryption only one type of permutation is used. Asymmetric encryption is used for things like digital signatures, block chains, and public key infrastructures.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.