In any system the threat to information is greater from within. The amount anyone goes to protect information is based on their budget because there is almost no end. So you measure what your information is worth to others and protect it within your budget.
Encryption employs mathematical algorithms to scramble the information. A system may use private keys and public keys...a good example is a preshared key.
Your home wireless network is a good example, people will employ WEP encryption so their neighbor cannot get into their system. In the router you enter a plain language word to be scrambled into a key, if you put in "golf" you get 2G5KCR83JCRU, this has to be entered into the wireless units for them to access the network. The router generates the key, but it has to be manually shared.
I hope that helps
No comments:
Post a Comment