Understanding the vocabulary of protection
There are many techniques to protect your applications and data, some of them are as follows:
Encryption and decryption: This is a two-way process to convert cleartext into cryptotext and back again
Hashes: This is a one-way process to; generate a hash to securely store passwords, or a hash can be used to detect malicious changes and corruption of data
Signatures: This technique is used to ensure that data has come from someone you trust by validating a signature against someone's public key
Authentication: This technique is used to identify someone by checking their credentials
Authorization: This technique is used to ensure someone has permission to perform an action, or work with some data by checking the roles or groups they belong to
Tip
Best Practice
If security is important to you, then hire an experienced security expert for guidance rather than relying on advice found online. It is very easy to make small mistakes and leave your applications...