Module 2 Class 06 read: Data file encryption - taylortommy23/401-Reading-Notes GitHub Wiki
You have been made responsible for the company’s file server. How would you preserve the three elements of the CIA triad?
- Collaboration with IT security professionals and keeping a proactive approach towards security will greatly enhance the preservation of the CIA triad in the company's file server environment.
Explain how hashing verifies data integrity using non-technical terms.
- Hashing is like creating a unique fingerprint for your letter. It's a process where a computer takes the content of your letter and uses a special formula to create a much shorter string of numbers and letters, called a hash.
How is hashing and encryption different?
- Encryption is about securing data to keep it confidential and accessible only to authorized parties, while hashing is about verifying the integrity and authenticity of data without any intention of reversing the process to its original form.
Resources: https://www.jscape.com/blog/implementing-the-cia-triad-when-transferring-files-through-the-internet https://www.howtogeek.com/67241/htg-explains-what-are-md5-sha-1-hashes-and-how-do-i-check-them/