Completed
Cryptography Cryptography was practiced for millennia before the Invention of computers One of the original and fundamental mechanisms for computer security
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Data at Rest Encryption - Addressing Modern Attacks Beyond the Basics
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What will they talk about? • Quick primer on cryptography, encryption, and key management • Issues with current at-rest data encryption approaches
- 3 A02:2021 - Cryptographic Failures
- 4 Cryptography Cryptography was practiced for millennia before the Invention of computers One of the original and fundamental mechanisms for computer security
- 5 Cryptographic Attacks . Modern cryptography is exceptionally strong against direct attacks
- 6 Problem - Keys
- 7 Two Predominant Use Cases for Encryption
- 8 The Central Implicit Trust Model
- 9 So, what's the problem with that?
- 10 Two Real-world Examples Security Incident
- 11 Better Approach
- 12 Example - Medical Records System Only a subset of data values and attachments are to be protected
- 13 Column-Level Encryption
- 14 Application-Level Encryption (ALE)
- 15 Parting Words of Crypto Advice