Information Security primarily serves these six distinct purposes - Authentication, Authorization, Prevention of Data Theft, Sensitive Data Safety / Privacy, Data Protection / Integrity, Non-Repudiation. The entire gamut of infosec rests upon Cryptography. The author begins as a protagonist to explain that modern cryptography is more suited for machines rather than humans. This is explained through a brief history of ciphers and its evolution into cryptography and its various forms.
The premise is further reinforced by a critical assessment of algorithm-based modern cryptography in the age of emerging technologies like artificial intelligence and blockchain. With simple and lucid examples, the author demonstrates that the hypothetical -man versus machine- scenario is not by chance, but by design. The book doesn-t end here like most others that wind up with a sermon on ethics and eventual merging of humans with technology i.e. Singularity.
A very much prac