Intro Cyber


Introductory articles about cybersecurity subjects:


The art of secret writing or code. A “plaintext” message is converted by the sender to “ciphertext” by means of a mathematical algorithm that uses a secret key. The receiver of the message then reverses the process and converts the ciphertext back to the original plaintext.[7]


The art of hidden writing. The secret message is hidden within another object, such as a digital photograph.[9]

Authentication and access

The process by which a potential client is granted authorized use of an IT facility by proving its identity.[11]