Encryption in information security ppt slideshare.pptx
1. Encryption in Cyber Security
Vital component for protecting digital information against
cyberattacks and data breaches
2. What is Encryption?
Plain Text
Original, readable data
Cipher Text
Encrypted, unreadable data
Encryption Key
Value used to encrypt plain text
Decryption Key
Value used to decrypt cipher text
3. How Encryption Works
1 Algorithm Selection
Choose mathematical procedure to change data
2 Key Generation
Create unique encryption and decryption keys
3 Data Transformation
Apply algorithm and key to convert plain text
4 Secure Transmission
Send encrypted data over networks
4. Types of Encryption
Symmetric Encryption
Same key for encryption and decryption
• Faster processing
• Efficient for large data
• Key exchange challenge
Asymmetric Encryption
Public key for encryption, private for decryption
• More secure key exchange
• Slower for large volumes
• Complex key management
5. Symmetric Encryption Algorithms
AES
Advanced Encryption Standard, widely used and secure
DES
Data Encryption Standard, older and less secure
3DES
Triple DES, applies algorithm three times
7. Data at Rest Encryption
1 Hard Drives
Encrypt stored data on physical devices
2 Databases
Protect sensitive information in data repositories
3 Cloud Storage
Secure data stored in remote servers
8. Data in Transit Encryption
Sender
Encrypts data before transmission
Network
Encrypted data travels securely
Receiver
Decrypts received data
9. End-to-End Encryption
1 Sender Encryption
Message encrypted on sender's device
2 Secure Transmission
Encrypted message sent over network
3 Receiver Decryption
Message decrypted only on receiver's device
14. Compliance and Legal Issues
GDPR
European Union data
protection regulation
HIPAA
US healthcare data privacy law
Regional Laws
Varying encryption regulations
across jurisdictions
16. Best Practices: Key Management
1 Secure Generation
Use reliable random number generators
2 Protected Storage
Employ hardware security modules (HSMs)
3 Controlled Distribution
Implement secure key exchange protocols
4 Regular Rotation
Change keys periodically to enhance security
17. Best Practices: Data Protection
At Rest
Encrypt all sensitive stored data
In Transit
Use secure protocols for data transmission
In Use
Implement secure computation techniques
18. Best Practices: System Updates
1
Regular Patching
Apply security updates promptly
2 Version Control
Maintain current encryption software
versions
3
Vulnerability Scanning
Regularly check for security weaknesses
19. Public Key Infrastructure (PKI)
1 Digital Certificates
Bind public keys to entities' identities
2 Certificate Authority (CA)
Issues and manages digital certificates
3 Registration Authority (RA)
Verifies user identity for CA
4 Certificate Repository
Stores and distributes certificates
20. PKI Applications
Secure Email
S/MIME for email
encryption and
signatures
Web Security
SSL/TLS for secure
browsing
Access Control
Certificate-based
authentication for
systems
Code Signing
Verify software
authenticity and
integrity
21. Future of Encryption
Quantum Encryption
Developing quantum-resistant
algorithms
AI Integration
Enhancing encryption with
artificial intelligence
Blockchain
Exploring decentralized
encryption solutions