More damage can be done through a mouse click than a bomb. Cybersecurity differs from conventional security in key ways: identities and messages can be spoofed or intercepted, compromising privacy, integrity, and non-repudiation. The pillars of reliable e-security are authentication, privacy, authorization, integrity, and non-repudiation. Cryptography uses encryption to scramble messages so only authorized parties can read them, and decryption to retrieve the hidden message. Symmetric encryption uses a shared secret key while asymmetric encryption uses public-private key pairs. Digital signatures provide authentication by encrypting a message digest with a private key.
Related topics: