Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This Cryptography lecture series covers about the services Cryptography provides, as well as the three main threats to privacy and confidentiality: Social Engineering, Media Reuse & Eavesdropping. In this Cryptography lecture, you'll learn what sort of impact 'loose security' decisions have on the protection of your network, such as network access controls and other safeguarding controls. You'll explore the benefits of blocking unused ports, enabling Mac Filtering and performing other due diligence in Cryptography. You'll also discuss the contrast between loose vs. tight security from a cost-benefit analysis perspective. And you'll learn why as a penetration tester and ethical hacker, it's critical to maintain direct, on-going communications with decision-makers about striking the proper balance between user-need and network security.