Protecting Secrets is an Art

How are secrets protected in an online world? Cryptology is the science of making and breaking secret codes and this is what is used to protect digital secrets.

Modern day protocols and algorithms secure communications by using cryptology. Access control is, a way of controlling access to a building, a room, a system, a database, a file, and information. This protects confidentiality by  identification, authentication, authorization, and accountability. Encryption method uses a specific algorithm, called a cipher, to encrypt and decrypt messages. The result is ciphertext. Plaintext plus a key creates ciphertext.

Symmetric algorithms (shared key), asymmetric algorithms (private and public keys) are two types of encryption

 

Processes that are logical access controls:

  • Encryption
  • Smart cards
  • Passwords
  • Biometrics
  • Access Control Lists (ACLs)
  • Protocols
  • Firewalls
  • Intrusion Detection Systems (IDS)

 

 Devices that are physical access controls:

  • Guards
  • Fences
  • Motion detectors
  • Laptop locks
  • Locked doors
  • Swipe cards
  • Guard dogs
  • Video cameras
  • Mantraps
  • Alarms

 

Administrative access controls are:

  • Policies
  • Procedures
  • Hiring practices
  • Background checks
  • Data classification
  • Security training
  • Reviews

These are defined by organisations to implement and enforce all aspects of controlling unauthorised access

Comments