From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Encryption

Encryption

From the course: CCSP Cert Prep: 2 Cloud Data Security Audio Review

Start my 1-month free trial

Encryption

- [Instructor] In chapter two, I explained cryptography, a very important security control in the world of cloud computing. Let's review some of the key points. (air whooshing) Cryptography is the use of mathematical algorithms to transform information into a form that is not readable by unauthorized individuals but that provides authorized individuals with the ability to transform it back into readable form by again using a mathematical algorithm called decryption. (air whooshing) Cryptography depends upon two basic operations. (computer boings) The first operation, encryption, converts information from its plaintext form into an encrypted version that is unreadable, known as a ciphertext. (computer boings) The second operation, decryption, performs the reverse transformation using an algorithm to transform encrypted information back into plaintext form. (air whooshing) We use encryption to protect both stored data…

Contents