Table of Contents Table of Contents
Previous Page  55 / 64 Next Page
Information
Show Menu
Previous Page 55 / 64 Next Page
Page Background

security issues.For example, a company’s database administrator

may need access to personnel files, but the personal information

contained within, such as employee salaries or Social Security

numbers, needs to be protected. How can someone analyze

encrypted files without having access to the actual document?

Perhaps the key security issue of the 21st century is the protection of data from hackers

and from cybercriminals. Math and coding are front-line weapons in that fight.

Math and Information Technology

55