PECB Training center
  • HOME
  • ISO 31000
  • CYBER DEFENCE
    • Using indicators to enhance defense capabilities​​​
    • Vulnerability Handling
    • Proactive detection of incidents
    • Presenting, correlating and filtering various feeds
  • GDPR
  • Contact

ICT SECURITY 2016

​The safety of cryptography

The safety of cryptography

​
There are many aspects of modern technologies that are transparently applied and should make us feel safe in our everyday use of Internet. Many users do not feel threatened, since they consider their data to be unimportant to others. But what about account hijacking, ransomware, etc. Do we understand how cryptographic algorithms work? Are we aware of the directions from which attacks could be launched? Which algorithms can be considered safe at the moment? These and other questions will be answered through examples from ancient to modern cryptographic algorithms and the evolution of both cryptography and cryptanalysis.

Proudly powered by Weebly
  • HOME
  • ISO 31000
  • CYBER DEFENCE
    • Using indicators to enhance defense capabilities​​​
    • Vulnerability Handling
    • Proactive detection of incidents
    • Presenting, correlating and filtering various feeds
  • GDPR
  • Contact