Mile2 Cybersecurity Certifications

Cybersecurity Certifications

Reply To: OCU C)ISSO C Discussion Lesson 08

#106256
Amy Hastings
Participant

Symmetric Cryptography is a key cryptography meaning that it only uses one key that it used by the sender as well as the receiver. The sender and receiver use this key to communicate secretly so just they know what the message is. This also does help keep their conversation private.

A con of symmetric cryptography is that if the key is not safely transmitted then it can lead to a vulnerability towards the users. The key has to be transmitted safely so it cannot get interrupted while its being transmitted. Another con is that if the key somehow gets compromised this will also cause your data to become at risk.
A pro of symmetric cryptography is that it is a lot faster using one key and it requires less work than that of the asymmetric cryptography. The symmetric cryptography is also less expensive than the asymmetric cryptography.

Asymmetric Cryptography is where the company uses two keys, and they are a public and a private key. The use of each is pretty simple, the public key is usually shared between people while the private key is kept secret between other people. One is also used for encryption while the other is used for decryption.

Pros of asymmetric cryptography is that it has a lot more security than symmetric cryptography does because with this one you do not have to exchange keys back and forth. It also uses things like online signatures that the sender has to sign so that way the receiver can use the private key to verify it, so it is more protected.
Cons of asymmetric cryptography is that it is slower than the symmetric cryptography is and this causes it to not be able to hold a large amount of data encryption. Another is that if you have the private key then anyone that has access to it can unfortunately disrupt your data.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Certifications

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.