Quick Glossary: Encryption
The overall success of a business is often dependent on its ability to effectively share, transfer and process vast amounts of data. Much of this shared data is sensitive and must be protected wherever it travels on and outside the enterprise network. The best way to accomplish the important task of securing business data is with sophisticated encryption systems.
This glossary from TechRepublic Premium covers encryption vocabulary and helps you make sense of this important security infrastructure.
From the glossary:
COLD BOOT ATTACK
A situation where an attacker with physical access to a computer can obtain encryption keys by rebooting the device. The technique relies on the fact that computer memory contents may remain readable during the cold boot process.
The download comprises a seven-page PDF.
Previously priced at $49, this is now available to download for $9. Or free with a Premium annual subscription: click here to find out more.
TIME SAVED: It took 12 hours of writing, editing and research to create this content.
Subscribe to the TechRepublic Premium Exclusives Newsletter
Save time with the latest TechRepublic Premium downloads, including original research, customizable IT policy templates, ready-made lunch-and-learn presentations, IT hiring tools, ROI calculators, and more. Exclusively for you! Delivered Tuesdays and Thursdays