课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

The cryptographic lifecycle

The cryptographic lifecycle

- [Instructor] Cryptographic algorithms and the keys used to secure information protected by cryptographic algorithms are among the most important components of any security program. Cybersecurity professionals must have a strong understanding of the cryptographic lifecycle to better select, maintain, and decommission the use of algorithms as the security needs of the organization and the threat environment change. As cryptographic algorithms age, they often become insecure, either because researchers discover flaws in their implementation or because the key-link they use becomes vulnerable to brute force attacks. Therefore, it's important to have a lifecycle approach to cryptography that phases algorithms out as they become insecure. The National Institute of Standards and Technology, NIST, offers a five-stage cryptographic lifecycle that organizations should apply to any use of cryptography in their enterprise. Phase one is initiation. During this phase, the organization realizes…

内容