{"id":33183,"date":"2017-09-21T06:51:56","date_gmt":"2017-09-21T10:51:56","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/data-encryption-hardware-software-security-online.php"},"modified":"2017-09-21T06:51:56","modified_gmt":"2017-09-21T10:51:56","slug":"data-encryption-hardware-software-security-online","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/data-encryption-hardware-software-security-online.php","title":{"rendered":"Data Encryption: Hardware &amp; Software Security: Online &#8230;"},"content":{"rendered":"<p><p>Data can be encrypted two ways: at rest and in transit.<\/p>\n<p>Please note: employing these two types of encryption safeguards must occur in tandem; it's not automatic. Data encrypted at rest does not guarantee it remains encrypted as it traverses a network. Conversely, data encrypted \"over the wire\" does not offer any safeguard that the content remains encrypted after it has reached its destination.<\/p>\n<p>Refers to data storage  either in a database, on a disk, or on some other form of media.<\/p>\n<p>Note: Indiana law recognizes the value of disk encryption  such that a lost\/stolen laptop or storage media is not considered a breach if that media was encrypted (and the encryption key was notavailable with the device).<\/p>\n<p>Refers to data that is encrypted as it traverses a network  including via web applications, smart phone apps, chats, etc. In-transit basically refers to the point at which the data leaves the storage drive or database until it's re-saved or delivered to its destination. Protecting information in transit essentially ensures protection from others attempting to snoop or eavesdrop on information as it traverses the network.<\/p>\n<p>Symmetric key algorithms use related, often identical keys to both encrypt and then decrypt information. In practice, this is known mostly as a shared secret between two or more parties.<\/p>\n<p>Asymmetric key algorithms, however, use different keys to encrypt and decrypt information; one key encrypts (or locks) while the other decrypts (or unlocks). In practice, this is known mostly as a public\/private key; the public key can be shared openly, the private key should not. In mostcryptographic systems, it is extremely difficult to determine the private key values based on the public key.<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original:<br \/>\n<a target=\"_blank\" href=\"https:\/\/protect.iu.edu\/online-safety\/hardware-software\/encryption.html\" title=\"Data Encryption: Hardware &amp; Software Security: Online ...\">Data Encryption: Hardware &amp; Software Security: Online ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Data can be encrypted two ways: at rest and in transit. Please note: employing these two types of encryption safeguards must occur in tandem; it's not automatic<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-33183","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33183"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=33183"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33183\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=33183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=33183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=33183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}