There are many other symmetric algorithms available to meet the encryption needs of organizations in a secure fashion. Three of the major symmetric algorithms used today are the Advanced Encryption Standard, Blowfish, and Twofish. In this video, learn the use and characteristics of each of those algorithms.
- [Instructor] Business continuity planning … is one of the core responsibilities … of the cybersecurity profession. … Business continuity efforts are a collection of activities … designed to keep a business running … in the face of adversity. … And this adversity may come … in the form of a small scale incident, … such as a single system failure or a catastrophic incident, … such as an earthquake or tornado. … The focus of business continuity … is keeping operations running. … And because of this, … business continuity planning is sometimes referred to … as continuity of operations planning or COOP. … Now, many organizations place responsibility … for business continuity with operational engineering teams. … Business continuity is a core security concept … because it's the primary control … that supports the security objective of availability. … Remember, that's one of the big three objectives … of information security, … confidentiality, integrity, and availability. … When an organization begins a business continuity effort, …
We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.