2.4.3. Data Encryption

Our personal and company data is targeted by hackers for financial gain.

Using an encryption strategy with our data will prevent them from being used by third parties, even if they get into the wrong hands.

Lesson goals and objectives

In this lesson you will learn:

  • The importance of encryption when sending personal data over the Internet
  • The concepts of Private Key and Public Key differ
  • To ensure that our browser displays https:// or a lock before sending private information over the Internet

The aim of languages is that we can understand each other but, there are times when we do not want the message we wish to convey to be understood ONLY by the recipient.

At such times we would like to be able to communicate in thousands or millions of different languages so that we can do so “secretly” with our recipient without others knowing.

The public key and private key allow us to “translate” any message into a strange language that only the recipient can understand. Data Encryption Procedure

Can you imagine sending a message, in a box containing a big puzzle where all the pieces can match? It would be complicated to reassemble the whole puzzle at the destination, wouldn’t it? But at the same time it would be safe if it fell into the hands of a third party. The more pieces that puzzle has, the more difficult it will be for someone other than the recipient to reassemble it correctly.

When we send confidential and personal information through our browser, we must make sure that the URL of the service we are using shows the protocol https:// or the image of a closed lock.

In this way we know that the data we are sending and receiving through that browser has been encrypted and no one who stands between our computer and the service computer can access and understand it.

Drag the words into the correct boxes