Models of protection

Discovery is a journey, take your next step now.
Unlocking this content requires one additional action.

This lesson describes how keys are generated, distributed, and managed for the purpose of encoding or decoding cryptographic data. Later, you’ll explore other methods of protection aside from cryptography, to give you a more well-rounded view of asset protection.