Cryptography Explained: Why It's Essential for Protecting Your Data π
Discover the fundamentals of cryptography and how it safeguards your sensitive information. Learn about various encryption techniques that keep your data secure and private.

Eye on Tech
71.9K views β’ Dec 24, 2019

About this video
Cryptography keeps your sensitive data on lockdown. There are a few different cryptography techniques to encrypt, or protect, data so you can share in confidence. Learn more about cryptography, encryption, and the methods used.
Cryptography is the method of protecting information with codes, and encryption is what you get from cryptography. Encryption is locking data so no one can see or access it except for authorized users with a key to decrypt it.
Cryptography concerns itself with four main objectives: confidentiality, integrity, non-repudiation and authentication. Cryptographic algorithms, or ciphers, encrypt and decrypt messages to secure communications among computer systems, devices like smartphones, and applications. Symmetric and asymmetric cryptography are the two main methods of encryption.
What cryptographic use cases have you encountered? How secure was the encryption method you used? Let us know in the comments and be sure to like this video.
Read more about cryptography: https://searchsecurity.techtarget.com/definition/cryptography/?utm_source=youtube&utm_medium=description&utm_campaign=aOdxWtqibCI&offer=video-aOdxWtqibCI
Subscribe to Eye on Tech for more videos covering the latest in business technology, including security, networking, AI, DevOps, enterprise strategy, storage, devices and more:
https://www.youtube.com/EyeOnTech
Stay up to date on the latest security news: https://searchsecurity.techtarget.com/
Follow us on Twitter: https://twitter.com/SearchSecurity
Like us on Facebook: https://www.facebook.com/SearchSecurity.com/
#Cryptography #Encryption #EyeOnTech
Cryptography is the method of protecting information with codes, and encryption is what you get from cryptography. Encryption is locking data so no one can see or access it except for authorized users with a key to decrypt it.
Cryptography concerns itself with four main objectives: confidentiality, integrity, non-repudiation and authentication. Cryptographic algorithms, or ciphers, encrypt and decrypt messages to secure communications among computer systems, devices like smartphones, and applications. Symmetric and asymmetric cryptography are the two main methods of encryption.
What cryptographic use cases have you encountered? How secure was the encryption method you used? Let us know in the comments and be sure to like this video.
Read more about cryptography: https://searchsecurity.techtarget.com/definition/cryptography/?utm_source=youtube&utm_medium=description&utm_campaign=aOdxWtqibCI&offer=video-aOdxWtqibCI
Subscribe to Eye on Tech for more videos covering the latest in business technology, including security, networking, AI, DevOps, enterprise strategy, storage, devices and more:
https://www.youtube.com/EyeOnTech
Stay up to date on the latest security news: https://searchsecurity.techtarget.com/
Follow us on Twitter: https://twitter.com/SearchSecurity
Like us on Facebook: https://www.facebook.com/SearchSecurity.com/
#Cryptography #Encryption #EyeOnTech
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
71.9K
Likes
350
Duration
2:28
Published
Dec 24, 2019
User Reviews
4.1
(14)