ELearning - Computer Software

0:00
Elearning
257
1

Description

The following is an example of one slide of eLearning material for a software security system.

Vocal Characteristics

Language

English

Voice Age

Young Adult (18-35)

Accents

North American (Canadian - West) North American (Canadian-General) North American (General) North American (US General American - GenAM)

Transcript

Note: Transcripts are generated using speech recognition software and may contain errors.
There are two basic techniques for encrypting information, symmetric encryption and asymmetric encryption. Symmetric encryption uses a single key for encrypting and decrypting. This key is shared by the parties that are exchanging encrypted information. Asymmetric encryption uses a pair of keys. Both keys are mathematically-related. one key is used for encrypting the information. The other key is used for decrypting the information. Hashes, on the other hand, are not encrypted information because they cannot be decrypted. A hash algorithm generates an irreversible output from any input.