Cryptography | · Conversion of Information or plaintext to ciphertext or assemble them invulnerable, protected against various cyber-attack · Two significant portions of algorithms for cryptography: · The encryption—the method of encoding information in such a manner from transmitters to recipients that none pretender can apprehend · The decryption—the contrary method of encryption, accomplished by secret key · Cryptographic breakdown emerges: lacking authenticated encryption of the data, absence of powerful and state-of-the-art algorithms as well as protocols, usages of FTP and SMTP for the conveyance of tactful data | v It’s foreseen that quantum computer would damage the encryption of bitcoin |
Insider Threats | · Vicious hazards inside the organization from present or past staffs, developers or members · It’s a deliberate deception activity where private or monetarily beneficial information is the larceny · Conventional cyber security strategy (detection system, firewalls) are inadequate to detect insider threats | v In accordance with the “2020 Cost of Insider Threats study” of the Ponemon Institute, the mean yearly expenditure of interior violations of data was USD 11.45 millions where about 63% of these circumstances were imputed by dereliction |