To begin, we'll take the following definitions of 'privacy' and 'information privacy' from the International Association of Privacy Professionals:
Following on from Encryption 101, this post will focus on different methods of Encryption, when they're applicable and why they are important.
Written by Andrew McKenna, PCI, PA, P2PE-QSA at Foregenix
When it comes to talking about encryption, it’s important to ensure we’re speaking about the same thing – and to clarify and simplify some of the different implementations we see. Sometimes these are implemented for security and best practice, while other times they are implemented to tick a box. It's important to know the difference between encryption mechanisms, know when to use what and be able to identify and judge the security of particular implementations. This is the first of 2 or more posts.