ABSTRACT

At this point in the book, we have repeatedly stressed the importance of key management in other chapters while referencing this chapter. Cryptography is used in almost every aspect of security controls relating to confidentiality, integrity, and authentication.