Reader small image

You're reading from  Enterprise Cloud Security and Governance

Product typeBook
Published inDec 2017
PublisherPackt
ISBN-139781788299558
Edition1st Edition
Tools
Right arrow
Author (1)
Zeal Vora
Zeal Vora
author image
Zeal Vora

Zeal Vora works as a DevSecOps Engineer primarily in the area of Defensive Security. He spends his days protecting and implementing security controls to help mitigate attacks both on the Cloud and servers. He is actively involved in security consultation, helping various startups which have been breached to overcome the breach and start again with a secure infrastructure.
Read more about Zeal Vora

Right arrow

Why do we need cryptography?

Let's run traceroute to see the path the packet takes to reach the destination.

We have done traceroute on kplabs.in and I have attached the results in the following image:

If we look into the preceding output, just to reach kplabs.in, the packet had to traverse 20 different nodes across the world.

This means that the data (login/password) we send travels through all these nodes. If an attacker is monitoring one of these nodes, then sensitive data can get leaked or may be altered in transit.

This is one of the reasons why cryptography plays a very significant role and we have an entire chapter dedicated to it.

Having said this, in designing defensive network, people and process are much more important than products that are used in network security. However, the components are very necessary as well.

...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Enterprise Cloud Security and Governance
Published in: Dec 2017Publisher: PacktISBN-13: 9781788299558

Author (1)

author image
Zeal Vora

Zeal Vora works as a DevSecOps Engineer primarily in the area of Defensive Security. He spends his days protecting and implementing security controls to help mitigate attacks both on the Cloud and servers. He is actively involved in security consultation, helping various startups which have been breached to overcome the breach and start again with a secure infrastructure.
Read more about Zeal Vora