From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Encryption
From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review
Encryption
- [Instructor] In chapter two, I explained cryptography, a very important security control in the world of cloud computing. Let's review some of the key points. (air whooshing) Cryptography is the use of mathematical algorithms to transform information into a form that is not readable by unauthorized individuals but that provides authorized individuals with the ability to transform it back into readable form by again using a mathematical algorithm called decryption. (air whooshing) Cryptography depends upon two basic operations. (computer boings) The first operation, encryption, converts information from its plaintext form into an encrypted version that is unreadable, known as a ciphertext. (computer boings) The second operation, decryption, performs the reverse transformation using an algorithm to transform encrypted information back into plaintext form. (air whooshing) We use encryption to protect both stored data…
Contents
-
-
-
(Locked)
Cloud data storage1m 43s
-
(Locked)
Cloud data storage Q&A1m 27s
-
(Locked)
Encryption2m 7s
-
(Locked)
Encryption Q&A1m 33s
-
(Locked)
Key management1m 54s
-
(Locked)
Key management Q&A1m 46s
-
(Locked)
Public key infrastructure2m 28s
-
(Locked)
Public key infrastructure Q&A1m 32s
-
(Locked)
Cryptographic applications1m 53s
-
(Locked)
Cryptographic applications Q&A1m 20s
-
(Locked)
Data protection1m 52s
-
(Locked)
Data protection Q&A1m 14s
-
(Locked)
Information management2m 52s
-
(Locked)
Information management Q&A1m 4s
-
(Locked)
Data event auditability2m 59s
-
(Locked)
Data event auditability Q&A1m 1s
-
(Locked)
-