Now that you have learned about encryption and decryption, and worked through some encryption of code, it is time to determine what encryption is needed to provide security for your company's system. This will include plans to address:
- Passive and active network attacks
- Symmetric encryption
- Dissecting block and stream ciphers
- Dissecting the public-key algorithms
- Creating key pairs
- Passwords, hash, salt, and rainbow tables
- Secure Sockets Layer
- Email and IP security