Professional Documents
Culture Documents
Types, Algorithms,
Techniques & Methods
Joemari Saysay Sabao, MIT
What Is Data Encryption: Types, Algorithms,
Techniques & Methods
› What is Data Encryption in Network Security?
› How Does Data Encryption Work?
› Why Do We Need Data Encryption?
› What are the 2 Types of Data Encryption Techniques?
› What is Hashing?
› Best Encryption Algorithms
What is Data Encryption in Network Security?
Data encryption is the process of converting data from a readable
format to a scrambled piece of information. This is done to prevent
prying eyes from reading confidential data in transit. Encryption can
be applied to documents, files, messages, or any other form of
communication over a network.
Apart from the algorithms, one also needs an encryption key. Using
said key and a suitable encryption algorithm, the plaintext is converted
into the encrypted piece of data, also known as ciphertext. Instead of
sending the plaintext to the receiver, the ciphertext is sent through
insecure channels of communication.
› Privacy:
Encryption guarantees that no one can read messages or access
data except the legitimate recipient or data owner. This measure
prevents cybercriminals, hackers, internet service providers,
spammers, and even government institutions from accessing and
reading personal data.
› Security:
Encryption helps protect information from data breaches, whether
the data is at rest or in transit. For example, even if a corporate-
owned device is misplaced or stolen, the data stored on it will most
likely be secure if the hard drive is properly encrypted. Encryption also
helps protect data against malicious activities like man-in-the-middle
attacks, and lets parties communicate without the fear of data leaks.
SOURCE : https://www.datprof.com/solutions/get-gdpr-pci-and-hipaa-compliant/
GET GDPR, PCI AND HIPAA COMPLIANT
How DATPROF Privacy helps you getting compliant to privacy laws and regulations
Copyright ©2020 DATPROF. All Rights Reserved.