Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this subpart of our previous Hash lesson, we take a closer, more intimate look at digital signatures, SHA2 (256) and RSA, what is met by satisfying the digital signature standard, and what the entire packet transfer looks like when hashing takes place. We will also introduce concepts behind Protecting Data At Rest. Several key definitions are discussed included full disk encryption, file encryption, code signing with a discussion on how they differ, what occurs in each of those data transactions, and what happens as a result encrypted files systems at the operating system level and why Trusted Platform Module is useful and risky.