Completed
Proxy-side field-level encryption Acra
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Data as a New Security Boundary - Cryptography and Supporting Controls
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Things we won't talk about
- 3 Data security depends on a data flow
- 4 Data security 101
- 5 Encryption is an ultimate data security measure
- 6 A02:2021-Cryptographic Failures. Focused mostly on crypto usage and implementation.
- 7 A04:2021-Insecure Design. Focused on design, missing or wrong security controls.
- 8 Application-level encryption (ALE)
- 9 End-to-end encryption
- 10 Zero Trust / Zero Trust Architecture
- 11 Zero Knowledge Architecture (ZKA) - system where no one has access to unencrypted data, except the user (node, service, person). Also known as No Knowledge Systems
- 12 Other exciting crypto terms Privacy enhancing cryptography: SMPC, PSI, PIR, FHE, PAKE, OPAQUE.
- 13 Security controls to support crypto
- 14 Pros & Cons
- 15 Proxy-side field-level encryption Acra
- 16 Key hierarchy Database
- 17 ALE for NoCode platform
- 18 Crypto + supporting controls 1. Key management, separate key per customer (BYOK). 2. Full compartmentalization: customer's data is located in different DBs, encrypted by different key, each app uses …
- 19 ALE for fintech platform