RMG 300 Lecture Notes - Lecture 5: Transport Layer Security, Business Continuity Planning, Public-Key Cryptography

72 views1 pages

Document Summary

Allows remote users to access the company network. Organizations can impose their security policies through vpn. In the past, security was very straightforward - a designated cable line. What we do w/ a vpn is place clever software (like a tunnel/channel) - that is absolutely secure. Idea is only the other person can unlock the coded (encrypted) message - when it gets to the other end it is decrypted. Ex: germans sending encrypted messages, english could not decode it. Blockchain and cryptocurrency depend on public key encryption. Prime # = # w/ a factor of 1 and itself. Takes 2 large prime numbers and multiplies them together to create a larger prime number which is a public key, the private key would be the 2 large prime numbers that were multiplied to create the larger prime number. Very clever encryption - used for managing blockchain. Cold site - empty space, ready for equipment.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents