Section outline

    • Network Security Basics

      1. Authentication & Encryption

      • Authentication verifies identities using passwords, tokens, or certificates to ensure only authorized users or devices gain access rusheelraj.pythonanywhere.com+13vocal.media+13trendmicro.com+13.

      • Encryption scrambles data to keep it confidential and ensure integrity:

        • Symmetric (e.g., AES): same key for encryption & decryption.

        • Asymmetric (e.g., RSA): uses public/private key pairs