Our encryption technologies not only provide a secure channel of communication, but they can also prove that the data we’re receiving has not been changed between endpoints. In this video, you’ll learn about non-repudiation and how digital signatures can ensure the integrity and authenticity of our data.
Our modern applications make extensive use of cryptography. In this video, you’ll learn the basics of cryptography and some of the history of ciphers and secrecy.
The AIC triad is an important concept in security. In this video, you’ll learn about confidentiality, integrity, availability, and safety.
The cryptographic hash provides some important validation functions. In this video, you’ll learn the basics of cryptographic hashing and how they can be used to provide confidentiality, authentication, non-repudiation, and integrity.
One of the powerful features of modern cryptography is the ability to digitally “sign” your files and documents. In this video, you’ll learn how non-repudiation can be used to ensure the authenticity and integrity of your documents.
The fundamentals of security are broadly defined in the areas of confidentiality, integrity, and availability.