Encryption

What is MIM?

What is MIM Mobile Information Management

Mobile Information Management (MIM) ensures the secure provision of corporate data on mobile devices. Along with Mobile Device Management (MDM) and Mobile Application Management (MAM), it is another important component of Enterprise Mobility Management. MIM leverages technologies and practices such as encryption, cloud services, sandboxing, containers and others. What is MIM (Mobile Information Management)? The …

What is MIM? Read More »

What is AES (Advanced Encryption Standard)?

What is AES Advanced Encryption Standard

The Advanced Encryption Standard (AES) is a very secure symmetric encryption method. It works with block ciphers and is the successor of the Data Encryption Standard (DES). Worldwide, AES is used in many different areas. What is AES (Advanced Encryption Standard)? The abbreviation AES stands for Advanced Encryption Standard and denotes an algorithm for symmetric …

What is AES (Advanced Encryption Standard)? Read More »

What is PGP?

What is PGP?

PGP (Pretty Good Privacy) is a program that can be used to both encrypt and sign messages such as emails. It can be used for secure communication and uses asymmetric encryption methods with public and private keys. What is PGP? The abbreviation PGP stands for the English term “Pretty Good Privacy” and means “pretty good …

What is PGP? Read More »

What is The Tor Network?

What is the Tor network

The Tor Network (simply Tor for short) aims to provide anonymous Internet browsing for all users. Tor uses the principle of onion routing to encrypt users’ connections and transfer data on the Internet. In this way, it allows anonymous, secure surfing on the Internet. What is the Tor network? The beginnings of Tor can be …

What is The Tor Network? Read More »

What is a TLSA record?

What is a TLSA record?

A TLSA record is an entry in the Domain Name System that can be used to verify certificates and the authenticity of a server of a particular domain. The records are used for DNS-based Authentication of Named Entities (DANE) and eliminate the need to check a certificate via a Certificate Authority. DANE is used for …

What is a TLSA record? Read More »

What is end-to-end encryption (E2EE)?

What is end-to-end encryption (E2EE)?

End-to-end encryption ensures secure communication between two partners. The encryption and decryption of the transmitted information are performed directly by the two communication partners. Other stations involved in the transmission cannot access the information. What is end-to-end encryption (E2EE)? The English term for end-to-end encryption is end-to-end encryption, abbreviated E2EE. End-to-end encryption enables the secure …

What is end-to-end encryption (E2EE)? Read More »

What is A Digital Certificate?

What is A Digital Certificate

A digital certificate is an electronic proof of authenticity issued by a certification authority. Certificates are used on the Internet to encrypt data traffic. What is a digital certificate? The digital certificate is an electronic proof of authenticity issued by a certification authority (CA). On the Internet, certificates have the comparable function of an ID …

What is A Digital Certificate? Read More »

What is WLAN Encryption?

What is WLAN encryption

Encryption in WLAN ensures that the transmitted data is protected against unauthorized access and reading. There are various standards for encryption and authentication, such as WEP, WPA, WPA2 or, in the future, WPA3. The standards such as WEP or WPA are now considered outdated and insecure. They should no longer be used. What is WLAN …

What is WLAN Encryption? Read More »

What Is Cryptography And Why Is It Important?

what is cryptography and why is it important

Cryptography is a science for the development of cryptosystems and, along with cryptanalysis, a subfield of cryptology. With the help of cryptographic procedures such as encryption, data should be protected from unauthorized access and exchanged securely. The term cryptography is composed of the two words of ancient Greek origin “kryptos” and “graphein”. They mean “hidden” …

What Is Cryptography And Why Is It Important? Read More »