From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Data and media sanitization
From the course: ISC2 Certified Cloud Security Professional (CCSP) Cert Prep
Data and media sanitization
- [Narrator] Welcome back to this lesson on data and media sanitization. In this lesson, we're really going to continue to drive home the importance of cryptography and key management in the cloud. We're specifically going to talk about a concept called overriding and then following that we'll talk about another term called cryptographic erasure, or in other words, crypto shredding. So overriding, once again, is not a concept that's unique to the cloud. This happens even on your everyday systems at home, where when you delete a file, over time eventually that file is overwritten, but until it's overwritten, that data still exists on your disk. The only thing that happens is that your disk just forgets where that data is stored, which tells your operating system that it's no longer accessible, but the data is still written to the disk until it's overwritten. This overriding just happens naturally over time, but it can be very unpredictable. And so in this case, if we imagine here that…
Contents
-
-
-
(Locked)
Domain 1 overview1m 9s
-
(Locked)
Cloud computing definitions, roles, and responsibilities10m 21s
-
(Locked)
Key cloud computing characteristics6m 24s
-
(Locked)
Building block technologies6m 26s
-
(Locked)
Cloud activities, service capabilities and categories, and deployment models7m 51s
-
Cloud shared considerations6m 51s
-
(Locked)
Impact of related technologies9m 53s
-
(Locked)
Cryptography and key management3m 22s
-
(Locked)
Identity and access control5m 12s
-
(Locked)
Data and media sanitization3m 23s
-
(Locked)
Network security7m 5s
-
(Locked)
Virtualization security8m 6s
-
(Locked)
Common threats3m 16s
-
(Locked)
Security hygiene6m 4s
-
(Locked)
Cloud secure data lifecycle3m 51s
-
(Locked)
Business continuity and disaster recovery in the cloud6m 44s
-
(Locked)
Business impact analysis and functional security requirements6m 51s
-
(Locked)
Service model security considerations and cloud design patterns5m 24s
-
(Locked)
DevOps security2m 45s
-
(Locked)
Verifications and certifications using common standards6m 3s
-
(Locked)
-
-
-
-
-