From the course: ISACA Certified Information System Manager (CISM) Cert Prep
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Data security and endpoint protection
From the course: ISACA Certified Information System Manager (CISM) Cert Prep
Data security and endpoint protection
- [Instructor] Okay, so continuing on with technical security and technical security controls. Talking about encryption, like we did in the last section, is certainly relevant to the protection of the data itself. And data exists in one of three states. We either have data at rest, data's in motion, or data's in use. So when we talk about data at rest, we're talking about data being stored maybe on a hard drive or a network share. But the idea is that it's been saved to a specific location and exists there until it's removed or acted upon by some other entity. So for data at rest, encryption, like we talked about in the previous section, is the best way to protect the confidentiality. And also, we talked about hashing files to make sure that they haven't been modified as well. So that's certainly relevant to data at rest. One thing that I'll mention, rather than just basic encryption, a step further to protect the data in the event that a hard drive might be, well, let's just say…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
Information security program concepts7m 38s
-
(Locked)
Elements of an information security program9m 59s
-
(Locked)
Business case and budget12m 18s
-
(Locked)
Asset identification and classification12m 39s
-
(Locked)
Management controls19m 11s
-
(Locked)
Operational controls, part 115m 28s
-
(Locked)
Operational controls, part 219m 11s
-
(Locked)
Technical controls1m 42s
-
(Locked)
Symmetric cryptography6m 29s
-
(Locked)
Asymmetric cryptography7m 33s
-
(Locked)
Integrity and non-repudiation13m 15s
-
(Locked)
Data security and endpoint protection6m 50s
-
(Locked)
Network protection: segmentation12m 46s
-
(Locked)
Network address translation5m 30s
-
(Locked)
Wireless networks7m 13s
-
(Locked)
Network services10m 37s
-
(Locked)
Cloud integration13m 44s
-
-
-