Learning Log # 5

Ok so in the past two weeks, we mainly discussed two topics.
Encryption & Decryption
Access Lists

For Encryption and Decryption. First off, what is encryption?
Well, encryption is basically converting the message's content to symbols or characters that doesn't make sense, unless deciphered.
I learned that there can be different ways of encrypting messages and files. In my opinion, encrypting your files can be one of the most basic, but still a highly effective method in securing your files from unwanted parties. It's not difficult to learn encrypting too!

One of the other thing I learned this week is access lists. It's basically setting up restrictions in networks. In other terms, you can call access-lists "restrictions". For example, you can block access to certain ports, which in turn, would disable access and capabilities based on blocked port, you can also block a certain IP etc. I think setting up these access lists is a must for companies, since they would want to protect their sensitive data from hackers. 

Comments