Security

<Note> This page is still updating. Check back soon for more update.


Cyber Security

Physical Security

Social Security

Encryption

Symmetric Key

In symmetric key, both the encryption and decryption keys are the same.

  • Advanced Encryption Standard (AES) is a type of Rijndael block cipher. [Read more at Wikipedia] AES has now been integrated into many computer (x86 architecture) and mobile (ARM architecture) processors. To name a few prominent are:
    • Intel Coffee Lake processors (2017)
    • Intel Kaby Lake processors (2016)
    • Intel Skylake processors (2015)
    • AMD Zen 2 Ryzen Threadripper 3990X (2020)
    • Qualcomm Snapdragon 865 (2020)
    • Samsung Exynos 980 (2019)

Public Key / Asymmetric Key

In this scheme, the encryption key is available for user to use and encrypt messages. The decryption key is limited to thee party that can read the messages. This scheme is also more computationally intensive than symmetric scheme.

Cyber Attack

  • Brute force
  • Artificial intelligence (AI)

Cryptography

References

Keywords

cyber security, security, strategies, SSL, artificial intelligence, AI, threats, I2R cybersecurity, AES, hackers, data loss, privacy, risk management, Institute for Infocomm Research, Comms, communication, NTU, science, research

Tags:

#security #strategy #AI #riskmanagement #communication #i2r #singapore