Completed
So, what's the problem with that?
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Data at Rest Encryption - Addressing Modern Attacks Beyond the Basics
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What will they talk about? • Quick primer on cryptography, encryption, and key management • Issues with current at-rest data encryption approaches
- 3 A02:2021 - Cryptographic Failures
- 4 Cryptography Cryptography was practiced for millennia before the Invention of computers One of the original and fundamental mechanisms for computer security
- 5 Cryptographic Attacks . Modern cryptography is exceptionally strong against direct attacks
- 6 Problem - Keys
- 7 Two Predominant Use Cases for Encryption
- 8 The Central Implicit Trust Model
- 9 So, what's the problem with that?
- 10 Two Real-world Examples Security Incident
- 11 Better Approach
- 12 Example - Medical Records System Only a subset of data values and attachments are to be protected
- 13 Column-Level Encryption
- 14 Application-Level Encryption (ALE)
- 15 Parting Words of Crypto Advice