Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson covers cryptographic tools and explains how cryptography is used to protect confidentiality, integrity and authenticity. Companies was to prevent unauthorized disclosure of information. This lesson discusses threats to confidentiality, the greatest of which is social engineering, which is all about impersonation. To fight breaking confidentiality, companies can use separation of duties, meaning very specific roles and they only possess the knowledge to fulfill those roles.