Encryption

Home/Tag:Encryption

Cryptography- Part 2

2020-07-15T13:29:55+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Cryptography- Part 2 Asymmetric Cryptography / Public Key Cryptography In this method, two keys are used: Private Key: This key is only known by the owner itself. Public key: This key is issued by using Public Key Infrastructure (PKI) where a trusted Certification Authority (CA) certifies the ownership of key pairs. Only the private [...]

Security Capabilities of Information Systems

2020-07-15T13:57:00+00:00Tags: , , , , , , , , , , , , , , , , , |

Security Capabilities of Information Systems Security Capabilities of Information Systems are of important aspects of CISSP training course. In this section, we focus on Memory Protection, Trusted Platform Module (TPM) and Encryption / Decryption. Memory Protection Information Systems areĀ  very important. So Memory Protection is an important security concept associated. Memory in a computer [...]

Determine Data Security Controls

2020-07-16T06:43:19+00:00Tags: , , , , , , , , , , , , , , , , , , |

Determine Data Security Controls Data security controls employed by the states of data, standards, scoping, tailoring, and data protection methods. Data exists in one of three states: Data at rest: Data that lives in external or auxiliary storage devices, such as hard disk drives (HDDs), solid-state drives (SSDs), optical discs (CD/DVD), or even on [...]

Go to Top