States of Data

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

59 minutes
Video Transcription
how long and welcome to the protecting data class with Russia chain.
When we talk about death in our system, remember that data is one off the most important assessed. And if you want to get an attack, most of the times people, we are Attackers. Hackers will try to I thank your debt and try to learn about the important information.
So let's learn about the stage off.
They're so there's maker at interest,
which is the deck of that stores in the medium,
like in a deck of MS
Our data toe are not doing any process on it, and it's usually really important. And I would say not every that is important, but we really wants to protect our data. The second kind of state of data is dead and transit. So it's a day that such offer vantage work
and this data is kind of moving in our network.
The third kind off letter is that I can use, which is any death that is used by the computer currently right now
in the life streaming. So how do we protect this NATO that does it start? It's usually we encrypt sensitive data
if start so Let's suppose heaven at the base. And it has different, like home in the table, like a little. But I have. Then you have a person,
their best war
and their email address.
So act, Tristen. This did the best. I would be encrypting which kind are being crypt in most likely the password. I mean, like, because that's the thing that nobody wanted to share it with others right now, sure, press more
death in transit is dead essence off our network.
So I'm sending Ain't right now, So I'm going to encrypt on Lee the sensitive data again. So I suppose I'm shopping online and trying to enter my credit card number. So when my prose er send it, it's going to increase the credit card number.
Not really. My name or other information, Maybe the CVI number, like that number in the back of the car that would encrypt it because they are sensitive data.
The only thing with Decca in use, which is the better we are going to have currently we're processing it. We don't read, don't encrypt it.
And this is basically a not show. We encrypt the data, and when it's our systems And if we're using the datum we're doing process on it, we basically don't not encrypt it. So, like, a software lately supposed to have a software that the developer is working on it. So basically they will
take that it will transit to them. It will be encrypted. They decrypted, do the process on it, then they will decrypt the result.
But while they are processing and working and using on the data, they are not going to encrypt it.
Lates match and have a fun drollas matching. So I have to the lift different kind off from data, and I want you to figure out Is it addressed? Is it in transit, or is that the end use? So the first green box is create a hash of a text
and for creating a hash of ethics?
Isn't this kind of death direct out? Is it addressed Isn't in transit or in use
Second box three bucks. We have data saved in the database, and the question is, if it's in the database, is it trust? Is it entrance it on the news?
Finally, if the credit card data injured in online shopping at that point, our is this better interest or in transit or in yours.
The answer for this is right here. But let's take a moment. I think about it.
So basically, if you're creating a hash of the password he are creating, there's an action going right now. So I'm gonna tell you, this data is absolutely in heels. If the never is saved and that the best so it is safe,
there's nothing really going with it. So it is at rest now if you are having courage, cardiac and entered in online shopping. So there is an action going here and it's actually moving. But it s so the data is in transit.
Let's I want to close by and talked about a little bit about important that down. So we have what's called personal identifiable information for May like. This is an Obama tricks before men. This is the P I. A. Soapy. I A is information vent
in a system, you will collect it from the user's usually in database,
and if it's important, you would like to encrypt it, even if its interest at Trist on dhe, I also like the Social Security number. You will keep it like interest. And there's a system that's called the C. I. D. S and this work, really, with the credit card in the current card industry
and what's happened here, it's provide standard
security four organization that use and handed from great card like a visa and a master. And they usually give them, like a very strict scheme that use it like, you know, to protect your dead in their data based
that beach isa personal health information. Now this is a specific kind of the P I. I. The personal. I didn't different.
I didn't give up all information because most people don't like to share your health information and hospitals. You basically signed something when you go. It's called hipper, the Health Insurance Probability and Accountability Act off 1996.
And it's basically telling you that what's your right as passion? And who is that
Institute Health Institute are working with on my be sharing the information,
So it's basically a way to protect your data. Overall, it's really important to remember that
you want to protect the important data in your system by encrypting it on. Remember that it's also really important. You know, the laws and the important Toto. Identify if this debt that is important. Thank you so much for watching. I hope you enjoy this class.
Up Next
Data Protection Fundamentals

In Data Protection Fundamentals, Rasha Sharif explains the relationship between the collection and distribution of data, technology, and legal issues surrounding email encryption, steganography, and hashing algorithms. It is important to understand how safeguarding information can lead to no corruption or compromises taking place.

Instructed By