Leveraging encrypted data
The cryptographic algorithms and protocols developed over the years were primarily focused on securing data. However, like a two-edged sword, encryption can be used for malicious reasons.
In this section, we'll review how we use cryptographic techniques to help secure and protect our data. We'll then examine ways cybercriminals use encryption, such as concealing malware or holding our data hostage. In addition, we'll discuss how government and law enforcement agencies seek to decode encrypted data on phones or computers during an investigation.
Let's start with reviewing ways that cryptographic techniques help secure our data.
Securing our data
Today, there are many things that threaten the security of our data. As a result, we remain vigilant in protecting our networks and data from attacks or unauthorized access. On any network, there are several goals or services we strive to provide, such as confidentiality, integrity...