Mile2 Cybersecurity Institute

OCU C)OST B Discussion Lesson 05

Tagged: 

Viewing 2 reply threads
  • Author
    Posts
    • #91932
      Manny Varela
      Keymaster

      Explain at least three different encryptions and when it would be appropriate to use them.

    • #112550
      Chase Cole
      Participant

      encryption is important because it helps keep information private and protected from people who should not have access to it. One common type of encryption is AES (Advanced Encryption Standard). AES is used to protect stored data, such as files on a computer or information in a database. It uses the same key to lock and unlock the data, which makes it fast and very secure for everyday use.

      Another type of encryption is RSA encryption, which uses two different keys: a public key and a private key. RSA is often used when data needs to be sent securely over the internet, such as when logging into accounts or sending sensitive information. It is helpful because the public key can be shared without risking security.

      A third type of encryption is SSL/TLS encryption, which is commonly used by websites. This encryption protects the connection between a user’s web browser and a server. It is especially important for online shopping, banking, and any website that requires personal information. These encryption methods are essential for keeping data safe in today’s digital world.

    • #112554
      Lenay Nichols
      Participant

      Working for the Department of Defense also known as DoD under DLA, we commonly use Public Key Infrastructure (PKI) encryption. PKI uses certificates and key pairs, public and private keys, to verify identity and encrypt communications. This is why we use CAC cards to log into systems and access secure networks. PKI is appropriate in this environment because it provides strong authentication and secure access to sensitive government systems. In addition to PKI, AES or Advanced Encryption Standard, is widely used within our DoD systems to protect data at rest, such as classified files, databases, and stored system information. AES is appropriate because it is fast, highly secure, and approved for government use. TLS (Transport Layer Security) is also used to protect data in transit, especially when accessing internal web applications or transmitting information across DoD networks. TLS ensures that sensitive data cannot be intercepted while traveling between systems.
      Overall, us DLA workers depend on a combination of PKI, AES, and TLS encryption to meet these strict government security requirements and protect sensitive information.

Viewing 2 reply threads
  • You must be logged in to reply to this topic.

SUPPORT

Please Note:

The support ticket system is for technical questions and post-sale issues.

 

If you have pre-sale questions please use our chat feature or email information@mile2.com .

Privacy Overview
Mile2 Cybersecurity Institute

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.