Mile2 Cybersecurity Institute

Reply To: OCU C)OST A Discussion Lesson 05

#111450
Marisa Ross
Participant

You clearly explained the differences between symmetric encryption, asymmetric encryption, and hashing, along with practical examples for each. I especially liked how you pointed out that symmetric encryption, like AES, is fast and efficient when both parties can securely share a key, such as for encrypting files or databases. Your summary of asymmetric encryption with RSA was also spot-on. It’s ideal for secure communications between people who haven’t exchanged keys beforehand, which is crucial for things like HTTPS and digital signatures. Your take on hashing was great too, it’s not about hiding data, but about verifying integrity, like checking passwords or ensuring files haven’t been tampered with.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.