Data and Privacy: Security (Part 2)
Encryption
Definition: Encryption protects data to keep it private; it's the process of scrambling data to prevent unauthorized access.
Historical Example: Caesar Cipher was an early form of encryption; used a key for scrambling and unscrambling messages.
Modern Systems: Utilizes powerful key strings for encryption.
Key Types:
Symmetric: Same key for encryption and decryption.
Asymmetric: Two keys used; one for encryption, one for decryption.
Key Lengths: Longer key lengths (e.g., 128, 512) enhance security, making brute-force attacks impractical.
Data Types
Data at Rest: Information stored on servers (e.g., databases with sensitive customer info).
Data in Transit: Information being transmitted (e.g., logins during online transactions).
HTTPS: Indicates secure connections using TLS for encrypting in transit data.
Virtual Private Networks (VPNs)
Definition: VPNs create secure connections between networks through encrypted tunnels.
Types:
Client-to-Site: Single computer connects to a network securely.
Client-to-Client: Secure connection from user's device to a server.
Password Security
Strong Passwords: Essential to use complex passwords (e.g., passphrases, symbols, numbers).
Brute Force Attacks: Hackers use automated methods to try many combinations.
Multi-Factor Authentication: Adds security by requiring multiple proofs of identity.
Best Practices:
Avoid sharing or reusing passwords.
Do not use easily obtainable information (e.g., birthdays, pet names).
Avoid dictionary words; common patterns.
Password Management
Use of Password Managers: Convenient tools to store and manage multiple passwords securely.
Recommendation: Avoid writing down passwords; use a trusted password manager like LastPass.