Optiv Cybersecurity Dictionary

What is Encryption?

Encryption is a method in which plaintext or other data is converted from readable form to an encoded version that can only be decrypted with a decryption key.

 

End-To-End Encryption

It is the most effective way to achieve data security for the end-to-end protection of sensitive data transmitted across networks (data in motion), as well as sensitive data held in various systems and devices (data at rest). A popular internet security protocol that uses public key encryption is the Secure Sockets Layer (SSL), along with its successor, Transport Layer Security (TLS). These protocols are commonly used by browsers and internet servers when transmitting confidential data such as financial details for e-commerce transactions. 

 

Asymmetric vs. Symmetric Encryption

Today's most widely used encryption algorithms fall into two categories: symmetric (single key, which is faster but requires the sender to share the key with the recipient) and asymmetric (public key cryptography, which uses two linked keys: one public and one private). Many regulatory organizations and standards bodies (such as PCI-DSS) require encryption.

 

Encryption: Why It Matters

 

In the physical world, locking your door deters criminals from stealing your stuff. Think of encryption as your lock for the digital world, one that prevents cybercriminals from stealing your data (by encoding it to be unreadable). Encryption is probably already engrained into your daily life, especially if you consider that internet-connected conveniences (e.g. banking, shopping and communicating) depend on it to keep your sensitive information secure.  

 

There’s no telling how long encryption will stay relevant in an ever-shifting security landscape, but it currently stands as an effective and necessary security layer for organizations of all sectors and sizes. As of May 2021, the White House EO recommends enforcement of end-to-end encryption practices as a standard security protocol.

Encryption Solutions

 

You need data security, stat. Opt for end-to-end encryption solutions that both protect sensitive data transmitted across networks (data in motion) and the sensitive data held in various systems and devices (data at rest). 

 

Not sure where to start? Enlist Optiv’s experts to help:

 

Lock It

Image
threat-management-social2.jpg

Related Terms

Other Sources:

 

Contact Us



Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?