Cryptography controls include
|“||encryption of data during transmission and when it is stored on a system. Encryption is the process of transforming ordinary data into a code form so that the information is accessible only to those who are authorized to have access. Two applications of cryptography are virtual private networks and digital signatures and certificates.||”|
- ↑ GAO, Technology Assessment: Cybersecurity for Critical Infrastructure Protection (GAO-04-321) (May 2004) (full-text).