The world of cryptography is full of confusing terms that many non-cryptographers use in error. It’s important to have a solid understanding of this terminology to avoid implementation errors. In this video, learn the differences between codes and ciphers as well as the difference between block and stream ciphers.
- [Instructor] While heating and cooling concerns … top the list of environmental concerns, … data center managers must also be prepared … for more serious situations, … such as fire, flooding and electromagnetic interference. … Let's take a look at the controls used … to protect against these risks. … Fire is dangerous in any environment, … and it can be particularly damaging … in a facility filled with electrical equipment. … For this reason, data center managers … must design fire detection and suppression systems … that will detect and extinguish a fire … before it grows out of control. … Let's talk briefly about how fires start. … In order for a fire to burn, … it requires three key ingredients, … oxygen, heat, and fuel. … If you can deprive a fire … of any one of these three elements, it will go out. … The most common approach to fighting fires … is the use of water, … which deprives the fire of heat, … but water is not effective against all types of fires … and it can damage electronic equipment. …
Author
Released
10/29/2020We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
Skill Level Beginner
Duration
Views
Related Courses
-
Learning Threat Modeling for Security Professionals
with Adam Shostack41m 41s Intermediate -
Transitioning to a Career in Cybersecurity
with Marc Menninger1h 10m Intermediate -
Cybersecurity Foundations
with Malcolm Shore1h 59m Intermediate
-
Introduction
-
Study resources1m 42s
-
1. Data Center Protection
-
Site and facility design2m 47s
-
Physical access control4m 56s
-
Visitor management1m 30s
-
Physical security personnel2m 12s
-
-
2. Hardware and Data Security
-
Data lifecycle4m 28s
-
Hardware physical security4m 18s
-
-
3. Business Continuity
-
Business continuity planning3m 10s
-
Business continuity controls3m 32s
-
-
4. Disaster Recovery
-
Disaster recovery4m 24s
-
Backups4m 6s
-
Restoring backups2m 11s
-
Disaster recovery sites3m 22s
-
Testing BC/DR plans3m 3s
-
After action reports2m 39s
-
-
Conclusion
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Data center environmental protection