About This Chapter
Types of Encryption: Chapter Summary
Before you can master computer security, you'll need to know more than just the basics of the encryption process, such as technical information related to the types of encryption currently available. This chapter addresses each encryption type individually and includes extensive definitions, real-world examples, and explanations about their typical uses. These lessons give you a list of the most well-used encryption programs today, which can improve your skills and expand your knowledge base significantly.
The instructors who design our lessons are experts in the field of computer technology and security. They make sure to keep themselves up-to-date about the latest concerns in information security, breakthroughs in technology, and other key industry trends. You can rest easy knowing that our instructors include the most accurate and relevant information available, which you can immediately apply at your current place of employment.
Topics discussed in this chapter include:
- Definitions and examples of TLS and SSL encryption
- Advantages and types of symmetric encryption
- Description of email and end-to-end encryptions
- Examples of Blowfish, Public Key, and BitLocker Drive encryption
- Uses for the RSA and RC4 encryption algorithms
- Types and functions of encryption keys
- Various types of WEP, Wi-Fi, and HTTPS encryption
- Purpose of transparent data encryption (TDE)
- Homomorphic encryption and elliptic curve cryptography (ECC)
- Software necessary for data at rest encryption
- Overview of 2048-Bit, Link, IPsec, On-the-Fly, and Polymorphic
- Protocols for VPN encryption and off-the-record (OTR) messaging
- One-time pad encryption and types of Kerberos encryption
1. What is TLS Encryption?
In this lesson, we will provide a basic understanding of TLS (Transport Layer Security) Encryption and how to avoid ongoing challenges to TLS standards.
2. What is SSL Encryption? - Definition & Explanation
In this lesson, we will briefly define SSL encryption and explain how it is used to create a secure connection for the purpose of protecting sensitive personal or financial information between a web server and a user.
3. Symmetric Encryption: Definition & Example
This lesson will cover symmetric encryption, a well-known standard for data encryption. It is a shared-key methodology, meaning the key used to encrypt the data is the same key used to decrypt it. Data Encryption Standard (DES) is also explained.
4. Symmetric Encryption: Types & Advantages
In today's world, where many aspects of our lives are public, encryption is behind the scenes protecting us. In this lesson, we'll take a look at a specific method, symmetric encryption. At the end of the lesson, you should have a good understanding of this useful technology.
5. Blowfish Encryption: Strength & Example
This lesson will cover the Blowfish encryption method, which is a license-free method available for all types of users and uses. We'll discuss the benefits of Blowfish, as well as some examples of real-world applications.
6. End-to-End Encryption: Email & Android
Email and cell phones make up a big part of most people's lives, and as such require security. In this lesson, we'll take a look at end-to-end encryption, and how it applies to email and Android devices.
7. End-to-End Encryption Software
Information needs to be protected for various reasons these days. In this lesson, we'll take a look at one of the methods we can use, encryption, and a specific variant, end-to-end.
8. What is Email Encryption? - Definition & Methods
In this lesson, we will define email encryption, and we will also look at examples of current encryption methods. Even though there are robust tools for securing email, it is an ever-evolving science.
9. What is BitLocker Drive Encryption?
In this lesson, we will cover BitLocker drive encryption, a feature in Windows products that encrypts drives and protects the machine from unauthorized modifications to startup and system files.
10. Public Key Encryption: Definition & Example
Protecting information transfers and e-commerce transactions is of vital importance these days. And with the ever-increasing number, that is sure to continue. In this lesson, we'll take a look at commonly use method, public key encryption, and how it works.
11. RSA Algorithm: Encryption & Example
With the ever increasing instances of Internet-based commerce, it makes sense that protecting those transactions will become more and more important. In this lesson, we'll take a look at a commonly used algorithm, RSA, how it works, and where it is used.
12. What is WEP Encryption? - Process & Types
In this lesson, we'll explore the history of encryption using WEP and discuss how your Internet access is influenced by what standard of encryption your router uses to access the Internet.
13. Types of Encryption Keys
Ecommerce is a major component of business today, and with that comes the need for protection. In this lesson, we'll look at the protection used in ecommerce, encryption keys - what they are, the different types, and examples of when they are used.
14. RC4 Encryption Algorithm
Encryption plays a major role in many things these days. In this lesson, we'll take a look at one of the basic algorithms, RC4. At the end of this lesson, you should have a good understanding of how it works, and when it might be used.
15. Wi-Fi Encryption: Types, Security & Standards
In this lesson you'll learn about the different types of Wi-Fi encryption standards and which one works best when trying to secure your home or office Wi-Fi network.
16. HTTPS Encryption
With the rise of the Internet, it makes sense that there would be those out there that want to take advantage. Some at the expense of others. In this lesson, we'll take a look at a technology that is helping to keep us safe - HTTPS.
17. What is Transparent Data Encryption (TDE)?
This lesson will define Transparent Data Encryption (TDE) and how it works within database administration systems. TDE protects data at the file level, making it transparent to the end user.
18. Homomorphic Encryption: Example & Definition
We hear news about information leaks and compromises constantly. In this lesson, we'll take a look at an important method used to combat this, homomorphic encryption. We'll also look at what it is and how it works.
19. Elliptic Curve Cryptography (ECC): Encryption & Example
Security methods and strength are increasing at a rate that matches the processing power and capabilities computers can bring to bear. In this lesson, we'll look at one such method, public key encryption, and an improvement, elliptic curve cryptography.
20. Data at Rest Encryption: Software & Requirements
Information moves during the course of a day. This is a fact. But at times, it simply sits. In this lesson, we'll take a look at a stationary protection mechanism, Data at Rest Encryption, plus some software and requirements used by this important area.
21. VPN Encryption: Types & Protocols
VPN (Virtual Private Network) encryption is used to ensure secure communications over data networks. In this lesson, we'll look at some of the different protocols that make up a VPN and the types of encryption that are used within a VPN.
22. What is 2048-Bit Encryption?
The number of online transactions increase yearly, and in conjunction, the need for security. In this lesson, we'll take a look at 2048-bit encryption, what it is, and the advantage/disadvantage of using it. At the end, you should have a good understanding of this important technology.
23. One-Time Pad Encryption: Example & Definition
With the increased use of the Internet, there is a corresponding need for security. In this lesson, we'll take a look at one type of security measure, one-time pad encryption, and how it works.
24. Off-the-Record Messaging (OTR) & Encryption
Everyone seems to use instant messaging these days. In this lesson, we'll take a look at off-the-record messaging, encryption, and how these technologies are related.
25. What is Link Encryption?
Information security is only getting tougher to manage, as the need for security increases as our use of the Internet increases. In this lesson, we'll take a look at one form of security measure, link encryption, and see how it works.
26. What is IPsec Encryption?
IPsec encryption is a fundamental part of network communication. In this lesson, we'll see how it works. We will also discuss how networks function to illustrate how IPsec Encryption fits into the scheme of things.
27. Kerberos Encryption Types
Security is important in today's world. Events such as the Olympics bring it front and center. In this lesson, we'll take a look at Kerberos Encryption and the encryption types associated with it.
28. What is On-the-Fly Encryption?
Security and protection are becoming an ever-increasing part of our technology-based lives. In this lesson, we'll take a look at encryption, what it is, and what on-the-fly means with respect to it.
29. What is Polymorphic Encryption?
Encryption is an important topic these days, with the exploding use of the Internet. In this lesson, we'll take a look at a specific type, polymorphic, what it is, some of its advantages, and disadvantages.
Earning College Credit
Did you know… We have over 160 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Information & Computer Security Training course