Mile2 Cybersecurity Institute

#112554
Lenay Nichols
Participant

Working for the Department of Defense also known as DoD under DLA, we commonly use Public Key Infrastructure (PKI) encryption. PKI uses certificates and key pairs, public and private keys, to verify identity and encrypt communications. This is why we use CAC cards to log into systems and access secure networks. PKI is appropriate in this environment because it provides strong authentication and secure access to sensitive government systems. In addition to PKI, AES or Advanced Encryption Standard, is widely used within our DoD systems to protect data at rest, such as classified files, databases, and stored system information. AES is appropriate because it is fast, highly secure, and approved for government use. TLS (Transport Layer Security) is also used to protect data in transit, especially when accessing internal web applications or transmitting information across DoD networks. TLS ensures that sensitive data cannot be intercepted while traveling between systems.
Overall, us DLA workers depend on a combination of PKI, AES, and TLS encryption to meet these strict government security requirements and protect sensitive information.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.