From the course: Cybersecurity with Cloud Computing

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Cryptography foundations

Cryptography foundations

From the course: Cybersecurity with Cloud Computing

Start my 1-month free trial

Cryptography foundations

- [Instructor] Data may need to be protected in order to avoid unwanted exposure, or to satisfy regulatory obligations as it moves to and from the cloud and while it's stored there. Encryption is often the first answer that comes to mind when considering data protection, but encryption is a complex control, requiring a great deal of care when implementing it and needing rigorous key management. Encryption isn't the only solution to protecting data in the cloud. An alternative would be to replace sensitive data with a token that, with the correct authority, can be used to recover the data. Another would be to strip the confidential elements out and fully anonymize the information. Nevertheless, encryption does feature heavily as a cloud control. There are two types of encryption systems. Content-aware encryption systems apply the encryption algorithm to plain text data to produce an unstructured blob of cipher text,…

Contents