CHAPTER 22
Protecting Data Moving Through the Internet
As previously discussed, most users and organizations want to use the Internet to interact with different types of people. These interactions can involve activities such as exchanging information through email, social media, FTP transmissions, and other transport mechanisms. They can also involve activities that include sending sensitive personal information, conducting financial activities, or transferring medical information that typically CALLS for heightened security measures. In this chapter, you will learn to:
- Describe typical Internet access control strategies, including authentication methods and protocols
- Define basic cryptography implementations used to secure data in motion, including encryption, digital signatures, certificate management, PKI, public versus private keys, hashing, and key management
- Describe the two major components involved in creating a virtual private network (VPN)
Securing Data in Motion
Because...