Photo by Markus Spiske on Unsplash
BASIC INTRODUCTION
We no longer live in the 90s when the internet was just accessible to people. With the amount of information that is available and the sheer number of tools available to aid exploitation of vulnerabilities, it is necessary to implement proper security controls.
It is necessary to implement proper security mechanisms to not only the data stored at rest but also in transit. All it takes is a network sniffer to lose the confidentiality of the data.
Often passwords and security keys are transmitted over the network. If they get in the wrong hands, the attackers can compromise the integrity of the data or knock the systems online. Thus, affecting the availability of the data and the systems.
In a matter of minutes all the three elements of the CIA Triad (Confidentiality, Integrity and Availability) have been attacked and compromised by the attackers.
This is where complex cryptographic algorithms, hashing techniques and encoding mechanisms come into play which actually secures the information of the user that they have provided to the website or organization.
If properly implemented, these can help prevent the confidentiality and the integrity of the data.
What is Encoding and Why is it being used?
Encoding and decoding is a term usually used in the context of digital electronics. It is the process of converting a signal into another form for optimal transmission or storage.
Data is often encoded so that it preserves its meaning and can still be transmitted. For example, if you were to search for ‘who
Read more