Maintain the integrity and confidentiality of your data with these encryption tools
Source: Prentice Hall PTR
The days of totally private networks are long gone. Today, there is no way to avoid sending your business data outside of your network. Nor would you want to; sharing information with business partners and customers in the outside world is the biggest advantage of a global Internet. But how do you protect your data once it has left the safe confines of your network? Most businesses address this problem by using encryption.
Learn how to use encryption to maintain the integrity and confidentiality of your data on the Internet in this chapter download from Open Source Security Tools: The Practical Guide to Security Applications. The same open-source tools will also secure your data against unauthorized access by viewers within your network and from hackers as well. Chapter coverage includes:
- Symmetric and asymmetric encryption
- Different encryption algorithms
- Encryption applications
- Certificate authority security model
- Web of trust security model
- Using PGP, GnuPG, OpenSSH, FreeS/WAN, and John the Ripper
Author: Tony Howlett
Publisher: Prentice Hall
Chapter 9: Encryption Tools
ISBN: 0-321-19443-8; Copyright 2005 Prentice Hall. All rights reserved.
Used with permission from the publisher. Available from booksellers or direct from Prentice Hall