Protecting Data Summary
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:01
Hello there. Welcome to protecting data. My name is Alberto Garcia, and I will be guiding you through this process. We have covered some topics. Techniques are methods. Their importance is the aspect off data on data protection.
00:17
We know the cryptology is a turn that covers could photography on crypt analysis.
00:24
Cryptography is the story and practice off techniques for secure communication while crypt analysis is dead. The creature on analyses off coat ciphers on in Crete. A text with the poor purse off breaking into cryptography or information security systems
00:44
before finishing. Here's a pox assessment question for you.
00:49
What is the objective? Off correct analysis. Is it a find witnesses in or otherwise defeat cryptographic algorithms, or B. It's 30 techniques for secure communications
01:03
Or maybe see created creature ciphers
01:07
or the data deletion.
01:11
If you said a you're correct.
01:15
The started that crypt analysis is the story off cipher text ciphers on crypto systems with the aim off understanding how they work on finding un improving techniques for defeating or weakening them.
01:30
Be unsee our concepts related toe photography, but not create analysis.
01:38
Okay, next question.
01:40
We stayed a protection feature of a little for the Windows beast operate insistent on higher versions and create this strife under contents.
01:51
Is it a active directory
01:53
or be bits Locker or C this privilege or maybe D they relation?
02:04
You said B. You're right bit locker and creeps. The ex tries under contents were in Crete. It unauthorized users cannot see the files even if the computer had been stolen or the hard disk waas taken
02:23
on. Final question. Witch term is the rise from the Great Kryptos on Griffin, which means to write on what's already neither. Study off the principal on techniques by which information could be considered in ciphers later revealed
02:40
but legitimate You thirst employees in the secret key.
02:45
Is it a cryptography, or do you think it be cryptology? Or maybe see crypt analysis or the crypto system?
02:57
The answer here is a cryptography now encompasses the whole area off key controls, transformations off information into forms that are either impossible or computational, infeasible for unauthorized persons to duplicate or undo.
03:17
I'm Alberto Garcia and see you next time
Similar Content