
Autoři
Mykola Onai
Anotace
Introduction to privacy protection. General Data Protection Regulation. Privacy laws, regulations, and public policy. Foundational concepts of information security and privacy exploring information value. Classifications of threats to personal data. Digital footprint: definition, examples, and ways to reduce. Recommendation of privacy and security settings for software applications. Biometrics as data security. Technical aspects of information protection. Classification of cryptographic systems. Encryption key. Fields of application of cryptography. User identification. Password storage methods. Examples of simplest ciphers: are Caesar's Cipher and Generalized Caesar Cipher. Symmetric and asymmetric systems of cryptographic protection of information. Features of their use. Key exchange according to the Diffie-Hellman scheme and the RSA algorithm. The AES and its features (correct settings in applications). NIST competition. Requirements for the new algorithm. A system for checking the implementation of the algorithm for compliance with the standard. Digital Signature Standard (DSS) and El-Gamal scheme in digital signature mode.
licence
Creative Commons BY-SA 4.0
Jazyk
anglicky
rok vzniku
2024
cena
ZDARMA
Výukové materiály
další zdroje - mind mapa
za finanční podpory
Financováno Evropskou unií. Vyjádřené názory a stanoviska představují názory a stanoviska autorů a nemusí nutně odrážet názory a stanoviska Evropské unie nebo Domu zahraniční spolupráce. Evropská unie ani poskytovatel grantu za ně nenesou odpovědnost.