From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Cryptography overview: Part 2
From the course: CISA Cert Prep: 5 Information Asset Protection for IS Auditors
Cryptography overview: Part 2
- [Instructor] Alright, well, let's talk about crypto algorithms number two. This is the second part in our crypto algorithms piece. So, last time we talked about symmetric algorithms. Let's talk about asymmetric algorithms. So, asymmetric, of course, means something is different on both sides. If you chop it in half, you have two different things on both sides. And with asymmetric cryptography, we have a mathematically related key pair. We have a private key and a public key that are created together and then separated, right? They are mathematically related, so they've derived from a special, sort of, magical algorithm. And anything that you encrypt with one key can only be decrypted with the other key. You can't decrypt it with the same key. If I use the public key to encrypt something, I can only use the private key to decrypt it. The public key is useless for decrypting it. If I use the private key to encrypt something, I can't use that key to decrypt it. I've got to use the…
Contents
-
-
-
-
Data security2m 44s
-
Access control models15m 51s
-
Single sign-on9m 21s
-
Centralized access control9m 49s
-
Network security: Firewalls13m
-
Authentication protocols4m 12s
-
VPNs and tunneling10m 6s
-
Domain names system6m 20s
-
Cryptography overview: Part 113m 49s
-
Cryptography overview: Part 212m 28s
-
Cryptography: Hash algorithms and digital signatures6m 4s
-
Cryptography: Public key infrastructure and certificates10m 27s
-
PBX and VOIP security7m 33s
-
Secure protocols7m 11s
-
Wireless security10m 15s
-
Internet of Things and endpoint security2m 42s
-
Third-party vendor controls4m 37s
-
Physical and environmental security3m 6s
-
Security assessment and testing4m
-
Evidence collection and forensics3m 27s
-
-
-
-