Data and Privacy: Security (Part 2)

Encryption

  • Definition: Encryption protects data to keep it private; it's the process of scrambling data to prevent unauthorized access.

  • Historical Example: Caesar Cipher was an early form of encryption; used a key for scrambling and unscrambling messages.

  • Modern Systems: Utilizes powerful key strings for encryption.

  • Key Types:

    • Symmetric: Same key for encryption and decryption.

    • Asymmetric: Two keys used; one for encryption, one for decryption.

  • Key Lengths: Longer key lengths (e.g., 128, 512) enhance security, making brute-force attacks impractical.

Data Types

  • Data at Rest: Information stored on servers (e.g., databases with sensitive customer info).

  • Data in Transit: Information being transmitted (e.g., logins during online transactions).

  • HTTPS: Indicates secure connections using TLS for encrypting in transit data.

Virtual Private Networks (VPNs)

  • Definition: VPNs create secure connections between networks through encrypted tunnels.

  • Types:

    • Client-to-Site: Single computer connects to a network securely.

    • Client-to-Client: Secure connection from user's device to a server.

Password Security

  • Strong Passwords: Essential to use complex passwords (e.g., passphrases, symbols, numbers).

  • Brute Force Attacks: Hackers use automated methods to try many combinations.

  • Multi-Factor Authentication: Adds security by requiring multiple proofs of identity.

  • Best Practices:

    • Avoid sharing or reusing passwords.

    • Do not use easily obtainable information (e.g., birthdays, pet names).

    • Avoid dictionary words; common patterns.

Password Management

  • Use of Password Managers: Convenient tools to store and manage multiple passwords securely.

  • Recommendation: Avoid writing down passwords; use a trusted password manager like LastPass.