What is Cryptography?

Cryptography is the art of writing or solving codes. In cyber security, cryptography includes encryption and decryption of online communications, devices, and databases. There are two different types of cryptography: symmetric and asymmetric.

 

Encryption involves “the process of using an algorithm to convert binary data from one form to another, accessible only by a specific key.” (RSI Security). Decryption deals with the reverse process, which will result in the access of the data. Symmetric cryptography involves key-sharing while asymmetric cryptography involves two keys, a public key and a private key.

 

Cryptography can be useful for a multitude of things. Here are some ways that cryptography can be useful to you.

 

Encrypting Devices:

 

Some companies allow employees to “bring your own device”, often referred to as a BYOD. Encrypting these devices will increase the cyber security of the company because of the risk these devices pose. “The risk of data breaches is even higher if employees transmit sensitive data on these devices.” (RSI Security). Sensitive data also needs to be encrypted within communications and databases, in addition to encrypting the devices.

 

Securing Databases:

 

Encryption can help you secure your databases. “Database encryption is critical to mitigating threat risks to data at rest across on-premise and cloud databases.” (RSI Security). Encryption will make it harder for threat actors to access databases. Decryption should be difficult.

 

Encrypting Emails:

 

Lastly, encrypting communications such as emails also increases company cyber security. “End-to-end encryption tools can help secure sensitive emails, especially if private and public keys used to encrypt the emails are kept safe.” (RSI Security). Encryption might be necessary if anything is shared amongst email that would be useful to a threat actor.

 

Responsive Technology Partners is the leading cyber-security expert in the Athens, Metter, Milledgeville, Vidalia, and Atlanta, Georgia areas. We also have locations in Tampa, Florida, Roanoke, Virginia, Raleigh, North Carolina and San Antonio, Texas. Service offerings include I.T. support, cyber-security and compliance, cloud-based POS systems and support, telephony, cloud services, cabling, access control, and camera systems. Our company’s mission is to provide world-class customer service through industry leading I.T. solutions that make every customer feel as if they are our only customer. Please visit our website to learn more: https://www.responsivetechnologypartners.com/.

 

 

 

 

 

 

 

 

 

Sources: 

RSI Security. https://blog.rsisecurity.com/what-is-cryptography-in-cyber-security/