From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors
Unlock the full course today
Join today to access over 22,700 courses taught by industry experts or purchase this course individually.
Cryptography overview: Part 1
From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors
Cryptography overview: Part 1
- [Instructor] All right, let's talk about crypto algorithms, encryption. This is the first part in a two-part series of videos here about encryption algorithms, so let's get into it. So before we start talking about the actual algorithms and their specifics, let's talk about some important definitions, important terms, when we talk about encryption. So a cryptosystem is all of the necessary things that you need to encrypt and decrypt something. The software, the protocols, the algorithm, the keys, all the bits and pieces that you need to actually encrypt and then decrypt something. Well, PGP, pretty good privacy, is an example of a cryptosystem. Anything that encrypts and decrypts something, that's a cryptosystem. So plaintext is the readable, not yet encrypted or decrypted stuff that you have before you actually, or after you actually, encrypt or decrypt something. Ciphertext is the encrypted gobbledygook, the result of encrypting something. So you may also hear the term cleartext…
Contents
-
-
-
-
(Locked)
Data security2m 44s
-
(Locked)
Access control models15m 51s
-
(Locked)
Single sign-on9m 21s
-
(Locked)
Centralized access control9m 49s
-
(Locked)
Network security: Firewalls13m
-
(Locked)
Authentication protocols4m 12s
-
(Locked)
VPNs and tunneling10m 6s
-
(Locked)
Domain names system6m 20s
-
(Locked)
Cryptography overview: Part 113m 49s
-
(Locked)
Cryptography overview: Part 212m 28s
-
(Locked)
Cryptography: Hash algorithms and digital signatures6m 4s
-
(Locked)
Cryptography: Public key infrastructure and certificates10m 27s
-
(Locked)
PBX and VOIP security7m 33s
-
(Locked)
Secure protocols7m 11s
-
(Locked)
Wireless security10m 15s
-
(Locked)
Internet of Things and endpoint security2m 42s
-
(Locked)
Third-party vendor controls4m 37s
-
(Locked)
Physical and environmental security3m 6s
-
(Locked)
Security assessment and testing4m
-
(Locked)
Evidence collection and forensics3m 27s
-
(Locked)
-
-
-