{"id":7295,"date":"2015-08-08T04:52:59","date_gmt":"2015-08-07T20:52:59","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1240"},"modified":"2015-08-08T04:52:59","modified_gmt":"2015-08-07T20:52:59","slug":"definition-encryption","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/definition-encryption\/","title":{"rendered":"Definition of the Day: Encryption"},"content":{"rendered":"

Encryption refers to encoding and decoding data such that it can\u2019t be read easily. In computers, encryption is usually done by an algorithm that applies a large sequence of numbers that follow a specific pattern to each letter or number of the text string. Encoding and decoding the encrypted data requires what is known as a \u2018key.\u2019<\/p>\n

One can encrypt something as simple as a password and as complex as a giant database of health records.<\/p>\n

Websites can also be encrypted \u2013 so that requests and data passed and sent to from them are encrypted.<\/p>\n

To use the web safely one needs to get in the habit of identifying websites that use encryption. One can tell this by seeing if the URL begins with \u201chttps\u201d NOT \u201chttp\u201d.<\/p>\n

The \u201cs\u201d stands for secure. This means that any information you enter on that website\u2019s forms or login fields is encrypted before it is passed from you over the internet to that website\u2019s servers.<\/p>\n

NEVER enter information on a website that is not using encryption. Doing so means you would be passing things like your username and passwords over the web in easily-read text. This is easy for a hacker to \u2018sniff\u2019 and steal.<\/p>\n","protected":false},"excerpt":{"rendered":"

Encryption refers to encoding and decoding data such that it can\u2019t be read easily. In computers, encryption is usually done by an algorithm that applies a large sequence of numbers that follow a specific pattern to each letter or number of the text string. Encoding and decoding the encrypted data requires what is known as […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[346],"tags":[23,372,263,373,374,375,237],"class_list":["post-7295","post","type-post","status-publish","format-standard","hentry","category-definition-of-the-day","tag-cyber-security","tag-decoding","tag-definition-of-the-day","tag-encoding","tag-encryption","tag-encryption-keys","tag-fake-wifi-access-points"],"yoast_head":"\nDefinition of the Day: Encryption - BankVault<\/title>\n<meta name=\"description\" content=\"In this article, find out the definition of encryption, what are encryption viruses, and how to browse online safely.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bankvault.com\/definition-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Definition of the Day: Encryption - BankVault\" \/>\n<meta property=\"og:description\" content=\"In this article, find out the definition of encryption, what are encryption viruses, and how to browse online safely.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bankvault.com\/definition-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"BankVault\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BankVaultOnline\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-07T20:52:59+00:00\" \/>\n<meta name=\"author\" content=\"A. Yost\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:site\" content=\"@bankvaultonline\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"A. Yost\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Definition of the Day: Encryption - BankVault","description":"In this article, find out the definition of encryption, what are encryption viruses, and how to browse online safely.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bankvault.com\/definition-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Definition of the Day: Encryption - BankVault","og_description":"In this article, find out the definition of encryption, what are encryption viruses, and how to browse online safely.","og_url":"https:\/\/www.bankvault.com\/definition-encryption\/","og_site_name":"BankVault","article_publisher":"https:\/\/www.facebook.com\/BankVaultOnline\/","article_published_time":"2015-08-07T20:52:59+00:00","author":"A. Yost","twitter_card":"summary_large_image","twitter_creator":"@bankvaultonline","twitter_site":"@bankvaultonline","twitter_misc":{"Written by":"A. Yost","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bankvault.com\/definition-encryption\/#article","isPartOf":{"@id":"https:\/\/www.bankvault.com\/definition-encryption\/"},"author":{"name":"A. Yost","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a"},"headline":"Definition of the Day: Encryption","datePublished":"2015-08-07T20:52:59+00:00","dateModified":"2015-08-07T20:52:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bankvault.com\/definition-encryption\/"},"wordCount":208,"commentCount":0,"publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"keywords":["cyber security","decoding","definition of the day","encoding","encryption","encryption keys","fake wifi access points"],"articleSection":["Definition of the Day"],"inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bankvault.com\/definition-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bankvault.com\/definition-encryption\/","url":"https:\/\/www.bankvault.com\/definition-encryption\/","name":"Definition of the Day: Encryption - BankVault","isPartOf":{"@id":"https:\/\/www.bankvault.com\/#website"},"datePublished":"2015-08-07T20:52:59+00:00","dateModified":"2015-08-07T20:52:59+00:00","description":"In this article, find out the definition of encryption, what are encryption viruses, and how to browse online safely.","breadcrumb":{"@id":"https:\/\/www.bankvault.com\/definition-encryption\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bankvault.com\/definition-encryption\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.bankvault.com\/definition-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bankvault.com\/"},{"@type":"ListItem","position":2,"name":"Definition of the Day: Encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.bankvault.com\/#website","url":"https:\/\/www.bankvault.com\/","name":"BankVault","description":"cybersecurity","publisher":{"@id":"https:\/\/www.bankvault.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bankvault.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.bankvault.com\/#organization","name":"BankVault","url":"https:\/\/www.bankvault.com\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","contentUrl":"https:\/\/www.bankvault.com\/wp-content\/uploads\/2018\/11\/BankVault-Logo-Light.png","width":1212,"height":275,"caption":"BankVault"},"image":{"@id":"https:\/\/www.bankvault.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BankVaultOnline\/","https:\/\/x.com\/bankvaultonline"]},{"@type":"Person","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/3cdb9c0092164dfe039b20c2972e655a","name":"A. Yost","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bankvault.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11403c3c24c2d02aecc26fa833deb0ca?s=96&d=mm&r=g","caption":"A. Yost"},"url":"https:\/\/www.bankvault.com\/author\/blogger\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/7295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/comments?post=7295"}],"version-history":[{"count":0,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/posts\/7295\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/media?parent=7295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/categories?post=7295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bankvault.com\/wp-json\/wp\/v2\/tags?post=7295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}