A process used to secure data by converting it into a coded format, making it unreadable to unauthorized users. Encryption methods include symmetric and asymmetric encryption, both of which protect sensitive information during transmission.
Public Key
A key used in asymmetric encryption that is shared publicly to encrypt data. Only the corresponding private key, held by the recipient, can decrypt the data, ensuring secure communication
IP Address (InternetProtocolAddress)
A uniquenumerical label assigned to eachdevice connected to a computernetwork that uses the Internet Protocol for communication. It helps routedata between devices on the Internet.