Cryptography

· Conversion of Information or plaintext to ciphertext or assemble them invulnerable, protected against various cyber-attack

· Two significant portions of algorithms for cryptography:

· The encryption—the method of encoding information in such a manner from transmitters to recipients that none pretender can apprehend

· The decryption—the contrary method of encryption, accomplished by secret key

· Cryptographic breakdown emerges: lacking authenticated encryption of the data, absence of powerful and state-of-the-art algorithms as well as protocols, usages of FTP and SMTP for the conveyance of tactful data

v It’s foreseen that quantum computer would damage the encryption of bitcoin

Insider Threats

· Vicious hazards inside the organization from present or past staffs, developers or members

· It’s a deliberate deception activity where private or monetarily beneficial information is the larceny

· Conventional cyber security strategy (detection system, firewalls) are inadequate to detect insider threats

v In accordance with the “2020 Cost of Insider Threats study” of the Ponemon Institute, the mean yearly expenditure of interior violations of data was USD 11.45 millions where about 63% of these circumstances were imputed by dereliction