课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Hardware encryption

Hardware encryption

- [Instructor] Encryption is one of the most common controls used to protect sensitive information. When you encrypt a file or other form of data, you take its plain text form and use a mathematical algorithm to transform it using an encryption key into a version that's unreadable to someone who doesn't have the corresponding decryption key. This makes it possible to take sensitive information, encrypt it, and store it in insecure locations or transmit it over insecure networks. If the encryption is strong, the information will remain safe. We normally encrypt information using specialized software. For example, the AES Crypt software package, available for Windows, Mac, and Linux systems, implements the US government's advanced encryption standard to encrypt files. Let's take a look at how we can encrypt a file using AES Crypt on a Linux system. I'm here in my home directory and you can see that I have a file called AES.html. If I look at the contents of this file, you'll see that it…

内容