What is encryption?
A method of encoding information in such a way that only authorised parties can access it and those who do not have access cannot
It does not prevent theft, but does deny intelligible content from the interceptor
Plain text (intended information or message) is encrypted using an encryption algorithm, a cipher, which can only be read if decrypted
What are the 2 types of encryption?
Communities must have the same key in order to achieve secure communication
e.g. Advanced Encryption Standard (AES)- stronger keys 128/192/256 bit keys
What is PGP?
pretty good privacy
Encryption program that provides cryptographic privacy and authentication for data communication
Used for signing, encrypting and decrypting
a. Texts
b. Email
c. Files
d. Directories…
What are the 6 steps in PGP?
What is the NHS England information security policy?
Security policy to outline how NHS organisations comply with GDPR and other legislation to ensure confidentiality and covers the behaviour of individuals that manage information on behalf of NHS England
Aims to preserve:
What are the roles and responsibilities defined in the NHS England’s information security policy?
Chief exec- ultimately responsibility for information security
All staff- responsible for information security and must understand and comply with this policy
What should all mandatory data security awareness cover?
What are the requirements of the policy that all trusts must implement? (max 12)
What is a firewall?
A firewall is a network security system that monitors and control incoming and outgoing network traffic based on predetermined rules
Establishes a barrier between a trusted internal network and an intrusted external network, such as the internet
What are the 5 practices do security professionals use to ensure data integrity?
What is a checksum?
A checksum or hash is sequence of letters and numbers of a fixed length which is used to represent a file. The hash is unique and the hash can be compared to see if any changes have occur during file transfer
How would you use a check sum to ensure integrity of a file transfer?
Name the different checksums and the benefits of using larger checksums?
MD5, SHA-1, SHA-256
The SHA-256 has is much larger which reduces the change of collisions (where two different files have the same hash). A hacker could use this technique to disguise the file as a legitimate file.