Public Key Cryptography and Other Emerging Technologies
This chapter discusses public key cryptography and other important aspects of information asset security and control. An IS auditor is required to have a thorough understanding of the elements of public key infrastructure (PKI) as they need to be able to evaluate the functioning of public key cryptography and other technologies.
This chapter covers Domain 5, Protection of Information Assets, part A, Information Asset Security and Control. The following topics will be covered in the chapter:
- Public key cryptography
- Elements of PKI
- Cloud computing
- Virtualization
- Mobile computing
- Internet of things (IoT)
By the end of the chapter, you will have an understanding of various aspects of PKI and other technologies and will be able to evaluate their implementation.