{"id":7295,"date":"2015-08-08T04:52:59","date_gmt":"2015-08-07T20:52:59","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1240"},"modified":"2015-08-08T04:52:59","modified_gmt":"2015-08-07T20:52:59","slug":"definition-encryption","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/definition-encryption\/","title":{"rendered":"Definition of the Day: Encryption"},"content":{"rendered":"
Encryption refers to encoding and decoding data such that it can\u2019t be read easily. In computers, encryption is usually done by an algorithm that applies a large sequence of numbers that follow a specific pattern to each letter or number of the text string. Encoding and decoding the encrypted data requires what is known as a \u2018key.\u2019<\/p>\n
One can encrypt something as simple as a password and as complex as a giant database of health records.<\/p>\n
Websites can also be encrypted \u2013 so that requests and data passed and sent to from them are encrypted.<\/p>\n
To use the web safely one needs to get in the habit of identifying websites that use encryption. One can tell this by seeing if the URL begins with \u201chttps\u201d NOT \u201chttp\u201d.<\/p>\n
The \u201cs\u201d stands for secure. This means that any information you enter on that website\u2019s forms or login fields is encrypted before it is passed from you over the internet to that website\u2019s servers.<\/p>\n
NEVER enter information on a website that is not using encryption. Doing so means you would be passing things like your username and passwords over the web in easily-read text. This is easy for a hacker to \u2018sniff\u2019 and steal.<\/p>\n","protected":false},"excerpt":{"rendered":"
Encryption refers to encoding and decoding data such that it can\u2019t be read easily. In computers, encryption is usually done by an algorithm that applies a large sequence of numbers that follow a specific pattern to each letter or number of the text string. Encoding and decoding the encrypted data requires what is known as […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[346],"tags":[23,372,263,373,374,375,237],"class_list":["post-7295","post","type-post","status-publish","format-standard","hentry","category-definition-of-the-day","tag-cyber-security","tag-decoding","tag-definition-of-the-day","tag-encoding","tag-encryption","tag-encryption-keys","tag-fake-wifi-access-points"],"yoast_head":"\n