PKI Security Mechanisms
VerifiedAdded on 2019/09/21
|6
|1420
|320
Report
AI Summary
The assignment content discusses the importance of securing data transmitted over the internet, using public key infrastructure (PKI), security protocols such as SSL and VPN, file encryption, file hashing, and backup and restoration. PKI uses asymmetric cryptographic techniques to ensure confidentiality, integrity, and authentication. Security protocols like SSL provide end-to-end communication while file encryption methods like block cipher and steam cipher are used for securing data. File hashing is a one-way compression method that reduces the time taken for encryption. Backup and restoration processes involve creating additional copies of data to avoid loss due to disasters or errors.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
1 out of 6