Cryptography is the art, science, practice, and study of securing communications to make sure your computer stays safe. In its essence, cryptography is used to keep your messages and data safe from those lurking or actively trying to steal it. The four arts of cryptography: confidentiality, authentication, integrity, and non-reputation is used to help keep your information safe. Some common ways we use these four characters together is by using encryption, keys, plaintext, cipher text, algorithms, and ciphers to protect data and make sure it is hard to access. Confidentiality, in means of understanding when your computer is safe, keeps your information away from anyone who stumbles upon it, or is actively seeking it out. Once data has been encoded with cryptography, the original information can no longer be accessed and it looks like a jumble of letters. One of the best ways to lock away your information is to use an encryption algorithm and have codes. The four types of cryptography to lock away your information are called symmetric-key cryptography, public-key cryptography, key exchanges, and hash functions. Some ways to encrypt include transposition ciphers and substitution ciphers. Authentication turns to certificates, digital signatures, and keys to identify the person accessing the information is allowed to and authenticate that servers and clients are who they say they are. Integrity uses components of authentication to prove that messages are sent from the correct user and make sure it was not intercepted and changed along the way. Non-Reputation refers to whether an individual can dispute that they are the responsible party. This allows people to digitally sign data with their private key, linking them to whatever message or signature to identify them. Overall, combining the four characteristics of cybersecurity can help keep your information on your computer private and secured.