Completed
Zero Knowledge Architecture (ZKA) - system where no one has access to unencrypted data, except the user (node, service, person). Also known as No Knowledge Systems
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Data as a New Security Boundary - Cryptography and Supporting Controls
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Things we won't talk about
- 3 Data security depends on a data flow
- 4 Data security 101
- 5 Encryption is an ultimate data security measure
- 6 A02:2021-Cryptographic Failures. Focused mostly on crypto usage and implementation.
- 7 A04:2021-Insecure Design. Focused on design, missing or wrong security controls.
- 8 Application-level encryption (ALE)
- 9 End-to-end encryption
- 10 Zero Trust / Zero Trust Architecture
- 11 Zero Knowledge Architecture (ZKA) - system where no one has access to unencrypted data, except the user (node, service, person). Also known as No Knowledge Systems
- 12 Other exciting crypto terms Privacy enhancing cryptography: SMPC, PSI, PIR, FHE, PAKE, OPAQUE.
- 13 Security controls to support crypto
- 14 Pros & Cons
- 15 Proxy-side field-level encryption Acra
- 16 Key hierarchy Database
- 17 ALE for NoCode platform
- 18 Crypto + supporting controls 1. Key management, separate key per customer (BYOK). 2. Full compartmentalization: customer's data is located in different DBs, encrypted by different key, each app uses …
- 19 ALE for fintech platform