Implement multifactor authentication (MFA): Authentication is
a process used to validate a user’s identity. Attackers commonly exploit
weak authentication processes. MFA uses at least two identity
components to authenticate a user’s identity, minimizing the risk of a
cyberattacker gaining access to an account by knowing the username
and password.
Install a firewall: Firewalls may be able to prevent some types of
attack vectors by blocking malicious traffic before it can enter a
computer system and by restricting unnecessary outbound
communications.
Encrypt data: Ensure that data cannot be accessed even if storage can
be reached.
Encryption Fundamentals
Cryptography is the science of transmitting information
securely against potential third-party adversaries. The
main objectives of cryptography are the following:
Confidentiality: Guaranteeing that the information exchanged
between two parties is confidential between them and is not visible to
anyone else
Integrity: Ensuring that the integrity of a message is not changed
while the message is in transit
Availability: Ensuring that systems are available to fulfill requests all
the time
Encryption is an operation that involves applying an
encryption key to plaintext by using an encryption
algorithm. Encryption turns the plaintext into ciphertext.
Decryption is the inverse operation: The decryption key
is applied to the ciphertext, and the result is the original
plaintext. Encryption and decryption both involve
symmetric keys or public/private key pairs.
Public Key Encryption
Public key encryption is a method of encrypting data that
involves a pair of keys known as a public key and a
private key (or a public/private key pair). The public key
is usually published, and the corresponding private key is
kept secret. Data that is encrypted with the public key
can be decrypted only with the corresponding private
key. Figure 14-3 illustrates a very simplified way to
understand public key encryption.