From the course: CompTIA SecurityX (CAS-005) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Encryption and code signing

Encryption and code signing

- Let's review how encryption reduces the attack surface. Obviously, data protection, we're going to use encryption to protect data at rest and data in transit, and even sometimes data in use. Compliance, many regulatory frameworks and industry standards require encryption to protect sensitive data. Data integrity, encryption helps maintain data integrity by ensuring that any unauthorized modifications to the data are detected. And of course, secure communication. Encryption secures communication channels such as email and web traffic, preventing eavesdropping and on path attacks. And of course, access control. We can use encryption to enforce access control mechanisms. Some real world examples of encryption, HTTP over S or using SSL/TLS with HTTP, ensuring that sensitive information like login credentials and payment details are protected from eavesdropping and interception. Full disc encryption. FDE encrypts the entire contents of a storage device, such as a hard drive or a solid…

Contents