RMG 300 Lecture Notes - Lecture 5: Transport Layer Security, Business Continuity Planning, Public-Key Cryptography
Document Summary
Allows remote users to access the company network. Organizations can impose their security policies through vpn. In the past, security was very straightforward - a designated cable line. What we do w/ a vpn is place clever software (like a tunnel/channel) - that is absolutely secure. Idea is only the other person can unlock the coded (encrypted) message - when it gets to the other end it is decrypted. Ex: germans sending encrypted messages, english could not decode it. Blockchain and cryptocurrency depend on public key encryption. Prime # = # w/ a factor of 1 and itself. Takes 2 large prime numbers and multiplies them together to create a larger prime number which is a public key, the private key would be the 2 large prime numbers that were multiplied to create the larger prime number. Very clever encryption - used for managing blockchain. Cold site - empty space, ready for equipment.