Crptography

Cryptography is a method of securing communications through some protocols in order to make the information unreadable for an unauthorized user and secure or understood able only by the authorized entity.

Terms used in cryptography


Plain text - A text which is in unencrypted format and readable by everyone.
Ciphertext - A text which is in an encrypted format and only readable by authorized and intended person.
Key- Key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext or vice versa. The key remains private and secures communication.

Principles of Security

  • Confidentiality
  • Integrity
  • Authentication
  • Authorization
  • Availability
  • Non-Repudiation
  • Taxonomy
Let's describe these principles in brief:

Confidentiality - It Protects the information from any unauthorized disclosure.

Integrity - Data received should be exactly the same as the data sent. There should be no tampering or modification.

Authentication - Authentication is the process of verifying who you are? It verifies the identity of the Sender/Receiver and ensures communication is authentic.

Authorization - Authorization is the process of verifying what you have access to? It determines user privileges or access levels related to system resources.

Availability -  Data must be available to authorized parties when expected.

Non-Repudiation - It provides a guarantee that the Sender/Receiver cannot deny of transmitted data.

Taxonomy - Security Taxonomy helps us to understand the security mechanisms of an information system that protect data and maintain functionality as intended and it's different approaches and meanings by providing a base level to work from.

Taxonomy is divided into seven elements:
  1. Discovery
  2. Vulnerability Scan
  3. Vulnerability Assessment
  4. Security Assessment
  5. Penetration Test
  6. Security Audit
  7. Security Review
full-width

Post a Comment

0 Comments