Lisa Bock reviews asymmetric encryption, also called public-key encryption is a fundamental component of message security that uses two keys: a public and a private key, which are mathematically related.
- [Instructor] Symmetric encryption … provides fast, efficient encryption. … However, it requires that both sender and receiver … have the same shared key, which can be a problem … in a complex networked environment. … Asymmetric encryption, also called public key encryption, … is a fundamental component to provide security … as it uses two keys: a public key and a private key, … which are mathematically related. … Asymmetric encryption was developed in the 1970s. … There are many uses for asymmetric encryption … that include securely exchanging a secret key, … confidentiality using encryption, authentication, … and creating digital signatures. … With public key encryption, two keys are generated, … a public key and a private key. … The private key is kept private … and never shared with anyone. … The public key is shared and available to everyone. … Here we see two entities, Alice and Bob. … Alice has generated a key pair, a public and a private key. … Bob also generates a key pair, …
- Define “passphrase.”
- Recall the purpose of multifactor authentication.
- Identify the tool used in today’s Windows operating systems to secure the file system.
- Explain what happens when a file is moved into a folder with permissions.
- Name the authentication protocol used in Active Directory.
- Recognize the location of the audit logs.
- Summarize the purpose of hardening.
- Explain the purpose of cryptographic techniques.
Skill Level Beginner
IT Security Foundations: Core Conceptswith Lisa Bock1h 35m Beginner
IT Security: Key Policies and Resourceswith Gregory Michaelidis23m 44s Intermediate
1. Understand User Authentication
2. Understand Permissions
3. Dissecting Audit Policies
4. Server Protection
5. Providing email protection
6. Understand Encryption
Next steps1m 3s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.