40.Data Security - yojulab/learn_networks GitHub Wiki

Computer security

What is the CIA triad (confidentiality, integrity and availability)?

CIA triad

Confidentiality, Integrity, Availability

Beyond CIA : Cyptography, Protocol Security, MAC(Media Access Control)

Error Detection Tech

BEC : Parity Checking, Check Sum Checking

Cyclic Redundancy Checking(CRC)

FEC : Hamming code

Encryption and Decryption

https://www.ssl2buy.com/wiki/what-is-encryption-and-decryption

Types of Cryptography

Encryption Methods

  • Substitution Cipher, Transposition Cipher, Product Cipher, Algebraic Cipher