From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Cryptography: Hash algorithms and digital signatures
From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors
Cryptography: Hash algorithms and digital signatures
- [Instructor] Alright, let's talk about hash algorithms and digital signatures, ooh. Alright, so, a hash algorithm, isn't like an encryption algorithm that we've been talking about before. It's something that takes a variable length input, let's say a message, or a string, or a character, or even a full hard drive of data, and it generates a fixed length message digest as output, or a hash value sometimes we call it. But technically, the things that hash algorithms create are called message digest, or MDs. Now, it provides integrity, that's what we use hash algorithms for. It makes sure that nothing has been changed in a file. It creates this fixed length message digest, and if any of the input changes, if we change the file in any way, or we change the input in any way, we get a completely different resulting message digest, or value as our output. There's no confidentiality provided, nothing's getting encrypted. They're going to leave the message intact, it would be more accurate…
Contents
-
-
-
-
(Locked)
Data security2m 44s
-
(Locked)
Access control models15m 51s
-
(Locked)
Single sign-on9m 21s
-
(Locked)
Centralized access control9m 49s
-
(Locked)
Network security: Firewalls13m
-
(Locked)
Authentication protocols4m 12s
-
(Locked)
VPNs and tunneling10m 6s
-
(Locked)
Domain names system6m 20s
-
(Locked)
Cryptography overview: Part 113m 49s
-
(Locked)
Cryptography overview: Part 212m 28s
-
(Locked)
Cryptography: Hash algorithms and digital signatures6m 4s
-
(Locked)
Cryptography: Public key infrastructure and certificates10m 27s
-
(Locked)
PBX and VOIP security7m 33s
-
(Locked)
Secure protocols7m 11s
-
(Locked)
Wireless security10m 15s
-
(Locked)
Internet of Things and endpoint security2m 42s
-
(Locked)
Third-party vendor controls4m 37s
-
(Locked)
Physical and environmental security3m 6s
-
(Locked)
Security assessment and testing4m
-
(Locked)
Evidence collection and forensics3m 27s
-
(Locked)
-
-
-