O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. Cryptography

For thousands of years, humans have needed to keep secrets, whether the secret had to do with the strategy for the attack on a walled city, conspiracies to overthrow some unpopular political system, or the protection of credit card numbers that are transmitted during online purchases. So for these thousands of years, we have continued to design and use cryptosystems to help keep these valuable secrets secret.

Exam objectives in this chapter:

  • 5.1 Understand the application and use of cryptography

    • 5.1.1 Data at rest (e.g., Hard Drive)

    • 5.1.2 Data in transit (e.g., On the wire)

  • 5.2 Understand the cryptographic life cycle (e.g., cryptographic limitations, algorithm/protocol governance)

  • 5.3 Understand encryption concepts

    • 5.3.1 Foundational ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required