Cryptography can be used to protect data at rest on your system disk. In this video, explore what protection cryptography grants and some ways to implement it.
- [Instructor] Disk encryption is another…very powerful application of cryptography.…The idea here is cryptography's not used…for communication per se, but rather to encrypt data…that is at rest on some type of media.…So whether it's a CD, a DVD, a USB,…the disk inside of your computer,…when data is written to disk, when data is stored,…it is encrypted prior to being stored.…This helps provide confidentiality of that data.…If somebody were to steal a CD, get a hold…of your USB stick, steal your laptop from your car,…they'd be unable to decrypt…the information on that without the key.…
Windows has a built-in encryption utility…called Encrypted File System, also known as EFS,…that supports this concept of just enforcing…encrypted data at rest, and it's an easy way…because it builds into the Windows operating system…to provide an extra layer of protection on data at rest.…
Note: The Ethical Hacking series maps to the 20 parts of the EC-Council Certified Ethical Hacker (CEH) exam (312-50) version 10.
- Different types of cryptography
- Symmetric and asymmetric encryption
- Cryptographic hashing
- How digital certificates work
- Public key infrastructure (PKI) components
- Protocols that use cryptography
- Common types of cryptographic attacks