Journal Week 4

 This week we learned about security, particularly about encryption and how keys are used in networks to protect data. It's interesting to learn about encryption techniques that are now obsolete due to improvements in computing processors. I wonder how long it would take for currently recommended encryption methods to become obsolete.

Also, I found the examples in the lectures helpful. Thinking of the data exchange across a network as a conversation between two people (and possibly three if we include an eavesdropper) helps me understand the flow of data and vulnerabilities that can arise.

Comments

Popular posts from this blog

Module 4

Module 8

Module 3