O'Reilly logo

CISSP: Certified Information Systems Security Professional Study Guide, 6th Edition by Darril Gibson, Mike Chapple, James M. Stewart

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9

Cryptography and Symmetric Key Algorithms

THE CISSP EXAM TOPICS COVERED IN THIS CHAPTER INCLUDE:

5. Cryptography
A. Understand the application and use of cryptography
A.1 Data at rest (e.g., hard drive)
A.2 Data in transit (e.g., on the wire)
B. Understand the cryptographic life cycle (e.g., cryptographic limitations, algorithm/protocol governance)
C. Understand encryption concepts
C.1 Foundational concepts
C.2 Symmetric cryptography
C.3 Asymmetric cryptography
C.5 Message digests
C.6 Hashing
D. Understand key management processes
D.1 Creation/distribution
D.2 Storage/destruction
D.3 Recovery
D.4 Key escrow
F. Understand non-repudiation

Cryptography provides added levels of security to data during processing, storage, and communications. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required