Threats can still prevent bad actors in the digital security realm. Laws have been established to assist, but additional nonlaw-based deterrence capabilities exist. Firewalls act as artificial barriers or fences. Encryption is also a barrier that will take time and effort to crack. That amount of time and effort can be a deterrence in itself.
- [Narrator] Digital Security is very similar…to physical security.…When I say Digital Security, my intention includes…computer security, cyber security, information security,…or whatever flavor you prefer to use.…If it has digital circuits involved, I believe that…digital security should work.…When things evolve to say, quantum computing, maybe it would…change to quantum security.…So a simple approach to digital security is broken down…into the same four categories.…
Deterrence,…Detection,…Access Control,…and Personnel.…Let's take a look at Deterrence. Or Digital Deterrence.…Has anyone seen this, or something similar?…Digital Deterrence still uses threats to prevent bad actors.…Instead of a Trespasser's Will Be Prosecuted sign,…digital warnings say, attempts are subject to,…and you consent to monitoring.…
Examples of this can be fun.…Encryption, by itself, really only adds deterrence.…By that, I mean that data is really only scrambled.…That scrambling can always be undone with time and money.…That complexity means years of analysis, years of processing…
Note: This course was recorded and produced by Mentor Source, Inc. We're pleased to host this training in our library.
- Introduction to Spring
- Configuring the ApplicationContext
- Using the Spring expression language
- Configuring proxies
- Autowiring beans
- Using lifecycle methods
- Configuring beans with XML
- Understanding the initialization phases of the bean lifecycle
- Aspect-oriented programming and Spring