Cryptography is used to secure data and processes. For example, asymmetrical encryption technology is used when a number of people who do not know each other personally want to conduct secure online business transactions. Or to use digital signatures to validate the legality and authenticity of documents. Technological processes make it easier to comply with legal requirements. For these processes to be effective, the cryptographic keys being used need to be generated, saved, assigned and used securely. That means companies need to operate effective key management systems.
Security engineering – preventing potential cases of loss
Data theft can cause three of five possible cases of loss: monetary damages, damages of reputation and legal damages. Security engineering hardens IT systems, so that they can sustain these threats.