What are different types of security procedures?
Generally, digital certificates or digital signatures, and encryption software represent key components in any strategy to secure messages. Digital certificates and signatures are used to identify senders. Encryption refers to a process by which information that is transmitted over open or closed electronic channels is translated into a form that is unintelligible to any potential receiver until that message is decrypted (or retranslated). Encryption technology is highly advanced and it is safe to say that there are more likely sources of poor security in any network than the possibility that an unauthorized party will intercept and then break an encryption code. For example, experts in EC security typically are much more concerned with the potential for human breakdowns rather than encryption software failure.