• Encoding

    is for maintaining data usability

    and can be reversed by employing the same algorithm that encoded the content, i.e. no key is used.

  • Encryption
    is for maintaining data confidentiality
    and requires the use of a key (kept secret) in order to return to plaintext.

  • Hashing
    is for validating the integrity
    of content by detecting all modification thereof via obvious changes to the hash output.

  • Obfuscation is used to prevent people from understanding the meaning of something, and is often used with computer code to help prevent successful reverse engineering and/or theft of a product’s functionality.

  • Salting

    Passwords are often described as “hashed and salted”. Salting is simply the addition of a unique, random string of characters known only to the site to each password before it is hashed, typically this “salt” is placed in front of each password.

  • Peppering

    Cryptographers like their seasonings. A “pepper” is similar to a salt - a value added to the password before being hashed - but typically placed at the end of the password.

One might ask when obfuscation would be used instead of encryption, and the answer is that obfuscation is used to make it harder for one entity to understand (like a human) while still being easy to consume for something else (like a computer). With encryption, neither a human or a computer could read the content without a key.

  • What is the difference between threat, vulnerability, and a risk ?

A threat is from an attacker that will use vulnerability that was not mitigated because someone forgot to identify it as a risk

results matching ""

    No results matching ""