From the course: Cybersecurity with Cloud Computing
Unlock the full course today
Join today to access over 24,100 courses taught by industry experts.
Cryptography foundations
From the course: Cybersecurity with Cloud Computing
Cryptography foundations
- [Instructor] Data may need to be protected in order to avoid unwanted exposure, or to satisfy regulatory obligations as it moves to and from the cloud and while it's stored there. Encryption is often the first answer that comes to mind when considering data protection, but encryption is a complex control, requiring a great deal of care when implementing it and needing rigorous key management. Encryption isn't the only solution to protecting data in the cloud. An alternative would be to replace sensitive data with a token that, with the correct authority, can be used to recover the data. Another would be to strip the confidential elements out and fully anonymize the information. Nevertheless, encryption does feature heavily as a cloud control. There are two types of encryption systems. Content-aware encryption systems apply the encryption algorithm to plain text data to produce an unstructured blob of cipher text,…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
-
(Locked)
Cryptography foundations5m 36s
-
(Locked)
Data security and encryption5m 20s
-
(Locked)
Identity in the cloud7m 15s
-
(Locked)
Controlling access to cloud objects2m 14s
-
(Locked)
Setting up access control in AWS2m 55s
-
(Locked)
Logging and monitoring in the cloud4m 5s
-
(Locked)
VM monitoring with Azure2m 53s
-
(Locked)
-