Data at Rest Encryption - Addressing Modern Attacks Beyond the Basics

Data at Rest Encryption - Addressing Modern Attacks Beyond the Basics

OWASP Foundation via YouTube Direct link

Cryptography Cryptography was practiced for millennia before the Invention of computers One of the original and fundamental mechanisms for computer security

4 of 15

4 of 15

Cryptography Cryptography was practiced for millennia before the Invention of computers One of the original and fundamental mechanisms for computer security

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Data at Rest Encryption - Addressing Modern Attacks Beyond the Basics

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What will they talk about? • Quick primer on cryptography, encryption, and key management • Issues with current at-rest data encryption approaches
  3. 3 A02:2021 - Cryptographic Failures
  4. 4 Cryptography Cryptography was practiced for millennia before the Invention of computers One of the original and fundamental mechanisms for computer security
  5. 5 Cryptographic Attacks . Modern cryptography is exceptionally strong against direct attacks
  6. 6 Problem - Keys
  7. 7 Two Predominant Use Cases for Encryption
  8. 8 The Central Implicit Trust Model
  9. 9 So, what's the problem with that?
  10. 10 Two Real-world Examples Security Incident
  11. 11 Better Approach
  12. 12 Example - Medical Records System Only a subset of data values and attachments are to be protected
  13. 13 Column-Level Encryption
  14. 14 Application-Level Encryption (ALE)
  15. 15 Parting Words of Crypto Advice

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.