Encryption is the process of encoding information in such a way that unauthorized individuals cannot view it. Encryption is needed because there is plenty of information that organizations must ensure is kept private and confidential. Some of this information includes the following:
Encryption is performed by using the science of cryptography. Cryptography is a vast and complex subject. An in-depth understanding of it is beyond the scope of this book. Therefore, this section does not discuss how encryption works. What is important to know is that just about all organizations need to use encryption. Many are already using encryption, but others will wait until they suffer through a bad experience or have to comply with new laws that mandate the protection of personal data. Encryption's role in the organization includes the following:
As shown in the preceding list, encryption can be used at all levels of a security infrastructurefrom protection to network communications over the Internet to encrypting data on a drive. Encryption can provide confidentiality, authentication, integrity, and nonrepudiation for information in storage or in transit.
Introduction to Assessing Network Vulnerabilities
Foundations and Principles of Security
Why Risk Assessment
Risk-Assessment Methodologies
Scoping the Project
Understanding the Attacker
Performing the Assessment
Tools Used for Assessments and Evaluations
Preparing the Final Report
Post-Assessment Activities
Appendix A. Security Assessment Resources
Appendix B. Security Assessment Forms
Appendix C. Security Assessment Sample Report
Appendix D. Dealing with Consultants and Outside Vendors
Appendix E. SIRT Team Report Format Template