With intimidating terms and acronyms that only the technologists use, its easy to see why so much decision making is entrusted to those who live in this space.This article is intended to give non-technical executives a high level awareness of the technologies to better assess the adoption risks, costs, and benefits.
- Technologies
- Secrets
- Keys
- Biometrics
- Hashing
- Encrypting
- Techniques
- Passwords, Passphrases
- TOTP, Passkeys
- Signatures, Digests
- Making documents and messages trustworthy
- Protecting Privacy and Confidentiality
- Accessing systems
- Making systems trustworthy
