Time
33 hours 23 minutes
Difficulty
Beginner
CEU/CPE
33

Video Transcription

00:00
Hello and welcome back to the side. Very 2019 Camp tier Security plus certification. Preparation course.
00:09
We're going to continue our discussion of margin on the six and the topic of discussion will be the main six. Photography and pkr
00:17
surprise enough. We're going to continue our discussion of this objective from the previous video, which is 6.1. We're We're going to continue to compare and contrast basic concepts of photography
00:30
as mentioned in previous slide. What we're gonna do is continue to compare and contrast the basic concepts of photography.
00:36
One of the first things you gonna notice here within this particular slide here we see a couple of topics which encompasses dis objective. We could begin by taking looking implementation versus algorithms election, which encompasses Kryptos service provider. It's was your crypto module. We're gonna highlight the concept perfect for secrecy
00:55
and lastly, security through obscurity.
00:59
With that being said, let's begin by first article looking implementation versus algorithms. Election
01:04
implementation is the act of implement photography. Where in Agra, um, selection is a process of choosing the right algorithm for your implementation.
01:14
So what we want to do first, I'll take a look at cripple graphical service provider.
01:19
Now the cripple graphical serves about It is a software library that provides software hardware based on encryption and decryption services.
01:27
Then we have the cryptographic all module, which again is hardware software that performs cryptographic operations within a physical or logical boundaries.
01:40
That brings us to perfect for secrecy. In short, it's a mechanism to prevent the compromise of a private key used to create session keys from compromising past session keys.
01:53
This function sure that even if a private session kids compromise, the exposed content would be limit to that session on Lee.
02:02
Then we have security through obscurity.
02:05
Basically, it's the reliance and security engineering on design or implementation secrecy as a main method of providing security to a system or components. It's also been leaked that a system in a sort can be secure. It so long
02:20
has nobody outside of the implementation group is a lot to find out anything about his internal mechanisms.
02:27
Continuing our discussion 6.1 objective when we compare contracts that basic concepts cartography here again on some common use cases, what you're going to highlight First organ began by discussing low power devices
02:40
lonely and see
02:42
high resiliency
02:44
supporting, confident galley.
02:46
Supporting integrity.
02:47
Supporting obfuscation.
02:50
Supporting authentication, supporting non repudiation. Lastly, resource versus security constraints.
03:00
That's not. Continue discussing a comma use cases for photography.
03:04
The first item is low power devices.
03:07
Low power are low. Energy devices have significantly lower energy use and storage capabilities than many other standard devices.
03:15
No land sea is important, probably for standard devices. It's a nifty more important for low power devices
03:23
supporting company. Jallet.
03:25
Its Incident one of the chief goals of crypto systems Confident AL insures the information or communication kept private
03:34
supporting integrity,
03:36
integrity and photography and sure that the data is not alter without authorization
03:40
supported Office cation.
03:44
The act of making something difficult to understand
03:46
supporting authentication.
03:50
It is a process that verify the claim identity of system users.
03:54
Continue our discussion of common use case of photography. We have supporting non repudiation
04:00
if events the center from claiming they did not send the message also known as repudiating the message.
04:06
They were resource versus security considerations.
04:10
A resource constraints When you lack enough hardware software to perform eight times in a specific amount of time,
04:16
security concerns a different because they might be technical limitations of a solution or a standard or constraint built into your confidence policies and procedures,
04:28
they would have high resiliency.
04:30
It can best be described as a solution that ensures continuous operation, even if some components fail You Designing holly was your solution.
04:39
This brings us to our post assessment quest for this particular video presentation.
04:43
Perfect 4 60 is a mechanism to prevent the compromise of a private key used to create session keys from compromising past session keys in his case is a true or false statement.
04:57
In this case, if you select that true your absolute ***, because the mechanism to prevent the compromise or private key used great session keys from compromising past session keys.
05:09
This brings us to our key takeaways. From this particular video presentation,
05:13
we learned that the key screen is a number bits in a key used by a cryptographic ALS algorithm.
05:18
Security through obscurity is the belief that security of any sort can be of secure so long as nobody outside of its implementation group is allowed to find out anything about its internal mechanisms.
05:30
Key scratching is a technique that runs a path with through an algorithm to produce and enhance key user of at least 128 bits.
05:40
A resource constraint is when you lack enough hardware software to perform a task in a specific amount of time.
05:47
Security screens are different because they might be technical limitations of a solution or standard or constraints built into your company policies and procedures.
05:57
And our upcoming video would be taking a look at that brand new objective, which is six point to where we have to explain cryptographic algorithm and their basic characteristics. And again, I look forward to seeing you in a very next video.

Up Next

CompTIA Security+

Interested in the cybersecurity industry? The CompTIA Security+ is the gold standard for those looking to enter the cybersecurity industry. Join thousands of professionals who have gained this certification through this course and launched their careers in information security.

Instructed By

Instructor Profile Image
Jim Hollis
Independent Contractor
Instructor