Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)OST C Discussion Lesson 05

#104707
Cameron Tackett
Participant

Encryptions were really interesting to me. I did not realize there were so many different “styles” if you will. RSA or Rivest Shamir Adleman could be used to submit data over the internet. It lets the input of data be “password free”. However, the end user or receiving side need a “pass word” to be able to get the data. This way you have control over who is able to open/view the data you are sending out. Websites is a great place for this to be used, or emails. ECC has a smaller size, meaning it is great for less powerful machines like cell phones or tablets. The next one that peaked my interest was AES I could see this being used in a business setting where data is being exchanged with servers/or storage systems. That way it takes special access to input and export. I could also see this being used as a way for a potential contractor to make sure that a customers data is secure between both contractor and supplier.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.