NT2580
Introduction to Information Security
Unit 7 (July 28, 2016)
Role of Cryptography in Maintaining Confidentiality and Privacy of Data
Learning Objective
- Explain how businesses apply cryptography in maintaining information security.
Key Concepts
- History of cryptography
- Secret key and public key cryptography
- Encryption mechanisms and techniques
- Business applications of cryptography
- Impact of compliance laws on maintaining confidentiality of privacy data
Reading
- Kim and Solomon, Chapter 9: Cryptography.
Keywords
- Cryptosystem
- Cyphertext
- Digital Signatures
- Hashing Algorithm
- Key Management
- Public Key Infrastructure (PKI)
Assignments and Study Materials
- Unit 7 Lecture Slides
- Lab 7.1: Using Encryption to Enhance Confidentiality and Integrity
- Assignment 7.2: Select Appropriate Encryption Algorithms
- Assignment 7.3: Design an Encryption Strategy
- Resource Link: VeraCrypt
- Resource Link: QuickStego
- Resource Link: Gpg4win
Questions and Feedback
Use the form below to ask questions or provide feedback about the concepts covered during Unit 7's session of class: