Block ciphers work in a variety of different modes. The mode simply describes how you apply the cipher to each block of plaintext. In this video, Mike Chapple explains the common cipher modes, electronic codebook, cipher block chaining, and counter mode.
- [Narrator] We've already discussed some of the ways … that security professionals can ensure … the continued operation of systems. … Let's dig into this in a little more detail. … There are two key technical concepts that improve … the availability of systems. … High availability, otherwise known as HA, … uses multiple systems to protect against failures. … HA techniques are like the ones we discussed … in the previous video, … having a cluster of web servers in place … that can continue to operate even if a single server fails … is one example. … Another is using a pair of firewalls … with one designated as the backup. … The core concept of high availability … is having operationally redundant systems … sometimes at different sites. … The geographic dispersal of placing systems … in different locations protects you against damage … to a facility. … Fault tolerance or FT helps protect a single system … from failing in the first place by making it resilient … in the face of technical failures. …
Author
Released
10/29/2020We are a CompTIA Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
Skill Level Beginner
Duration
Views
Related Courses
-
Learning Threat Modeling for Security Professionals
with Adam Shostack41m 41s Intermediate -
Transitioning to a Career in Cybersecurity
with Marc Menninger1h 10m Intermediate -
Cybersecurity Foundations
with Malcolm Shore1h 59m Intermediate
-
Introduction
-
Study resources1m 42s
-
1. Data Center Protection
-
Site and facility design2m 47s
-
Physical access control4m 56s
-
Visitor management1m 30s
-
Physical security personnel2m 12s
-
-
2. Hardware and Data Security
-
Data lifecycle4m 28s
-
Hardware physical security4m 18s
-
-
3. Business Continuity
-
Business continuity planning3m 10s
-
Business continuity controls3m 32s
-
-
4. Disaster Recovery
-
Disaster recovery4m 24s
-
Backups4m 6s
-
Restoring backups2m 11s
-
Disaster recovery sites3m 22s
-
Testing BC/DR plans3m 3s
-
After action reports2m 39s
-
-
Conclusion
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: High availability and fault tolerance