Summary
In this chapter, you reviewed the relevant information to conduct audits and evaluate potential opportunities and threats associated with emerging technologies, regulations, and industry practices, in accordance with IS audit standards.
The following are some key takeaways from this chapter:
- In asymmetric encryption, two keys are used—one for encryption and the other for decryption. Messages encrypted by one key can be decrypted by another key. These two keys are known as private keys and public keys. A private key is available only to the owner of the key and a public key is available in the public domain.
- A CA is an entity that issues digital certificates. It is responsible for the issuance and management of digital certificates.
- IoT is a concept wherein devices have the ability to communicate and transfer data with each other without any human interference.
- Mobile computing is the use of devices that do not require a physical connection to process...