Cryptography is a method of securing communications through some protocols in order to make the information unreadable for an unauthorized user and secure or understood able only by the authorized entity.
Plain text - A text which is in unencrypted format and readable by everyone.
Ciphertext - A text which is in an encrypted format and only readable by authorized and intended person.
Key- Key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext or vice versa. The key remains private and secures communication.
full-width
Terms used in cryptography
Plain text - A text which is in unencrypted format and readable by everyone.
Ciphertext - A text which is in an encrypted format and only readable by authorized and intended person.
Key- Key is a string of bits used by a cryptographic algorithm to transform plain text into ciphertext or vice versa. The key remains private and secures communication.
Principles of Security
- Confidentiality
- Integrity
- Authentication
- Authorization
- Availability
- Non-Repudiation
- Taxonomy
Confidentiality - It Protects the information from any unauthorized disclosure.
Integrity - Data received should be exactly the same as the data sent. There should be no tampering or modification.
Authentication - Authentication is the process of verifying who you are? It verifies the identity of the Sender/Receiver and ensures communication is authentic.
Authorization - Authorization is the process of verifying what you have access to? It determines user privileges or access levels related to system resources.
Availability - Data must be available to authorized parties when expected.
Non-Repudiation - It provides a guarantee that the Sender/Receiver cannot deny of transmitted data.
Taxonomy - Security Taxonomy helps us to understand the security mechanisms of an information system that protect data and maintain functionality as intended and it's different approaches and meanings by providing a base level to work from.
Taxonomy is divided into seven elements:
- Discovery
- Vulnerability Scan
- Vulnerability Assessment
- Security Assessment
- Penetration Test
- Security Audit
- Security Review
0 Comments