Information Security

Control Methods

Encryption can be used as a control to mitigate any Threats from exploiting Vulnerabilities such that it upholds The CIA Triad, the concept of encryption as a control is to scramble data so that its meaningless for intruders without how it was scrambled

Encryption Example

Data can only be read by someone who has the decryption key

Feynman

If you bike is locked, the only way to ride your bike is to open it using that specific key. If anyone who doesn’t have that key tried to unlock the bike it wouldn’t work