Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
CompTIA Server+ Certification Guide

You're reading from   CompTIA Server+ Certification Guide A comprehensive, end-to-end study guide for the SK0-004 certification, along with mock exams

Arrow left icon
Product type Paperback
Published in Feb 2019
Publisher
ISBN-13 9781789534818
Length 514 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Ron Price Ron Price
Author Profile Icon Ron Price
Ron Price
Arrow right icon
View More author details
Toc

Table of Contents (28) Chapters Close

Preface 1. Section 1: System Architecture FREE CHAPTER
2. Server Hardware 3. Server Internals 4. Data Storage 5. Server Operating Systems 6. Addressing 7. Cabling 8. Section 2: Administration
9. Server Administration 10. Server Maintenance 11. Virtualization 12. Disaster Recovery 13. Section 3: Security
14. Security Systems and Protocols 15. Physical Security and Environmental Controls 16. Logical Security 17. Section 4: Troubleshooting
18. Troubleshooting Methods 19. Common Hardware Issues 20. Common Software Issues 21. Common Network Issues 22. Common Storage Issues 23. Common Security Issues 24. CompTIA Server+ Examination 25. Glossary 26. Assessment 27. Other Books You May Enjoy

Data encryption

Data or file encryption is the application of a cryptographic algorithm to the data or file so that when it's stored or transmitted, only those users or addressees with the appropriate access can open, execute, or apply its contents. Encryption and cryptography are expansive terms that cover a variety of approaches, applications, and methods to securing data and file assets. For the remainder of this discussion, we'll use the term encryption to cover data conversion through the application of cryptography.

At its most basic levels, encryption has three primary objectives—confidentiality, integrity, and availability (CIA). In addition, the CIA triad is usually extended to include authentication, authorization, and non-repudiation. Encryption is a data integrity and confidentiality protection mechanism.

...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image