Achieve Information Security by Preserving the Secrecy and Integrity of Keys

Download Now Free registration required

Executive Summary

Cryptography forms the basis of information security infrastructure. Data encryption, network traffic encryption, PKI-based authentication and digital signatures all depend on the underlying confidentiality of secret keys and integrity of public certificate authority keys to function as intended. When keys are compromised, information security systems cannot protect data. First-tier technologies such as network, data and access security measures are used to protect confidentiality of consumers' personal information and to control financial fraud. However, they are ineffective against insider attacks - which can amount to nearly 60% of all targeted information security attacks. Additionally, today's sophisticated malware requires systems to be comprehensively defended against hacking and compromise.

  • Format: PDF
  • Size: 1147 KB