Module 5: OSI Reference Model
Section outline
-
-
Network Security Basics
1. Authentication & Encryption
-
Authentication verifies identities using passwords, tokens, or certificates to ensure only authorized users or devices gain access rusheelraj.pythonanywhere.com+13vocal.media+13trendmicro.com+13.
-
Encryption scrambles data to keep it confidential and ensure integrity:
-
Symmetric (e.g., AES): same key for encryption & decryption.
-
Asymmetric (e.g., RSA): uses public/private key pairs
-
-