Stages
Utilize methods of encrypting including symmetric encryption by using algorithms such as AES to protect the information to be transferred as well as the data which is already stored in the computers. AES's new type is characterized to be of a high speed and security level, and it uses keys of 128/192/256 binary bits.
As a result, for asymmetric encryption, we will include RSA or ECC to encrypt the keys that will be used in the symmetric encryption to increase the security of user and server key exchanges. For passwords, hashing will be used where methods such as SHA-256 (Secure Hash Algorithm 256-bit) will be employed to protect passwords and also check the integrity of data; the aim being to ensure passwords are never saved in plain text.
The use of digital signatures based on the RSA or DSA (Digital Signature Algorithm) will allow users to be authenticated and the content to be defended from modification. The upgrade of access security will also be done through Multi-Factor Authentication.
Anti-virus/anti-malware scans, modification of cryptographic techniques, ethical hacking, and changing security measures will also be performed to resist threat. Private keys will be kept in Hardware Security Modules (HSM) to ensure no one gains access to it.
Last updated