Encryption Explained: How Symmetric & Asymmetric Methods Protect Your Data π
Discover the basics of encryption and learn how symmetric and asymmetric techniques safeguard your information in today's digital world, preventing costly data breaches.

iluli by Mike Lamb
45.8K views β’ Feb 28, 2019

About this video
In 2017 alone, the world saw data breaches affecting close to half a billion customers from companies such as eBay, Uber and Equifax.
Customer trust is built upon foundations of reliability, transparency and data encryption. Itβs imperative that businesses are vigilant and strive to remain deserving of the trust that users place in them. So, how does encryption work?
Find out more about the importance of security, how to prevent data leaks, and the nuances between symmetric and asymmetric encryption techniques in this explainer video from iluli by Mike Lamb β explaining the ideas and innovations changing our lives.
*New videos on the 1st of every month. Don't forget to like and subscribe:* https://bit.ly/subscribe_to_iluli
*Or visit the iluli website:* https://www.iluli.eu
_____
*Sources and Further Reading:*
β’ _Encryption, decryption, and cracking:_ https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/encryption-decryption-and-code-cracking
β’ _An Overview of Cryptography_ by Gary Kessler: https://www.garykessler.net/library/crypto.html
β’ _The Truth Machine: The Blockchain and the Future of Everything_ by Michael Casey and Paul Vigna
β’ _Understanding and Applying Cryptography and Data Security:_ https://www.britannica.com/topic/cryptology/History-of-cryptology
Customer trust is built upon foundations of reliability, transparency and data encryption. Itβs imperative that businesses are vigilant and strive to remain deserving of the trust that users place in them. So, how does encryption work?
Find out more about the importance of security, how to prevent data leaks, and the nuances between symmetric and asymmetric encryption techniques in this explainer video from iluli by Mike Lamb β explaining the ideas and innovations changing our lives.
*New videos on the 1st of every month. Don't forget to like and subscribe:* https://bit.ly/subscribe_to_iluli
*Or visit the iluli website:* https://www.iluli.eu
_____
*Sources and Further Reading:*
β’ _Encryption, decryption, and cracking:_ https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/encryption-decryption-and-code-cracking
β’ _An Overview of Cryptography_ by Gary Kessler: https://www.garykessler.net/library/crypto.html
β’ _The Truth Machine: The Blockchain and the Future of Everything_ by Michael Casey and Paul Vigna
β’ _Understanding and Applying Cryptography and Data Security:_ https://www.britannica.com/topic/cryptology/History-of-cryptology
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
45.8K
Likes
542
Duration
4:33
Published
Feb 28, 2019
User Reviews
4.5
(9)