Modern Cryptography for Cybersecurity Professionals

Modern Cryptography for Cybersecurity Professionals

In today’s world, it’s important to have confidence while either transmitting or storing data. Cryptography can provide confidentiality, integrity, authentication, and non-repudiation. But just what exactly is involved when we use cryptographic techniques? Modern Cryptography for Cybersecurity Professionals will help you gain a better understanding of the cryptographic protocols and processes that are necessary to secure data.

We’ll learn how encryption can protect data, whether in motion or at rest. You’ll get a better understanding of symmetric and asymmetric encryption and learn how a hash is used. You’ll also see how a public key infrastructure and certificates enable trust between parties, so we can confidently encrypt and exchange data. You’ll then see the practical applications of cryptographic techniques, including passwords, email, and securely transmitting data using a Virtual Private Network (VPN).

Who this book is for

This book is appropriate for IT managers, security professionals, students, teachers, or anyone who would like to learn more about cryptography and reasons it is important in an organization as part of an overall security framework. Participants should have a basic understanding of encryption, knowledge of general networking terms and concepts, and an interest in the subject.

What this book covers

Chapter 1, Protecting Data in Motion or at Rest, provides an overview of the current threat landscape. You’ll learn how encryption provides many security services, such as confidentiality, integrity, and authentication. We’ll then review some common terms, along with two basic cryptographic concepts: substitution and transposition.

Chapter 2, The Evolution of Ciphers, takes us through some early uses of cryptography. We’ll review monoalphabetic and polyalphabetic ciphers and compare different methods used to encode transmissions during wartime. We’ll then learn about the development of the Lucifer and Feistel ciphers, as scientists recognized the need to secure digital data.

Chapter 3, Evaluating Network Attacks, compares passive and active attacks and outlines why it’s essential to protect data so that it remains in its original, unaltered form. You’ll then learn how using encryption can ensure data integrity and prevent it from being changed, destroyed, or lost in an unauthorized or accidental manner.

Chapter 4, Introducing Symmetric Encryption, steps through the evolution of symmetric (or secret key) encryption. We’ll examine common algorithms, such as the Advanced Encryption Standard. We’ll then dissect block and stream ciphers and compare the different operating modes. Finally, we’ll take a look at some methods of securing wireless communications.

Chapter 5, Dissecting Asymmetric Encryption, outlines how asymmetric (or public key) encryption can be used in many ways, such as exchanging the shared secret key, securing email, and creating a digital signature. We’ll compare algorithms such as Rivest, Shamir, Adleman (RSA) and Diffie-Hellman, along with a discussion on key management.

Chapter 6, Examining Hash Algorithms, explains that a hash algorithm is a one-way function that produces a fixed-length output called a message digest. We’ll identify some of the optimal hash properties along with some common hash algorithms in use today. Finally, you’ll learn how a message digest provides message authentication.

Chapter 7, Adhering to Standards, explains that security laws and standards exist to provide guidelines and best practices to prevent data loss. In addition, we’ll compare ways that we can use encryption to protect data, but also how cybercriminals use encryption to conceal malicious activity.

Chapter 8, Using a Public Key Infrastructure, outlines how the Public Key Infrastructure (PKI) framework provides trust between two entities communicating on the internet by using a trusted third party that enables secure interactions between entities. We’ll discuss key management and examine what happens when both parties exchange a certificate.

Chapter 9, Exploring IPsec and TLS, combines all of your knowledge of cryptography as we examine the concepts of a VPN. We’ll begin by outlining several types of VPNs in use today and explain the concept of an Internet Protocol Security (IPsec) VPN, along with a Transport Layer Security (TLS) communication stream.

Chapter 10, Protecting Cryptographic Techniques, reviews common attacks designed to alter the integrity of our data or systems. We’ll recognize how the PKI can be attacked, which can negate trust. Finally, we’ll see how advances in technology will require quantum-resistant algorithms to encrypt and secure our data.

电子书说明:

  • 关于本书的内容介绍、目录、详情等请在 AmazonGoolge Books 等售书网站搜索查看,本站仅展示封面作为参考。
  • 如无特殊说明,本站提供的所有pdf均为文字版(aka True PDF or Digitally Created PDF)。
  • 本站已经列出的所有图书均可以找到。
  • 收到PDF链接之后建议尽快下载或者保存到自己的百度网盘,防止链接过期失效。

免费获取本书PDF

扫描下方二维码添加微信号 bookyage 回复本书编号 215915 即可,我们会尽快(一般24小时之内)将本书PDF文件以百度网盘链接的形式发送给您。

注意:每位用户只能免费获取1本书的pdf,超过1本之后需要以微信转账方式每本支付9.9元人民币代找费用才能继续收到相应的pdf。

如果看不到二维码,请按F5刷新本网页!或者直接添加微信号:bookyage