Security Cloud Privacy Tech
Cybersecurity Basics #5 - Encryption

Cybersecurity Basics #5 - Encryption

Mornings With Mark no. 0100

Watch the episode on YouTube

Join the discussion on LinkedIn

Share on Twitter

Bad Robot Transcript

Good morning, everybody. How you doing today? Welcome to episode 100 of mornings with Mark. That’s kind of crazy to me that we made it to episode 100 you for sticking with me throughout this journey on I think it’s been a lot of fun and hopefully you feel the same trip ship encryption is something that a lot of people use is a word as kind of Hit the mainstream vocabulary.

We see it clearly understand what exactly is a I’m just a really high level refers to a number of modern Technologies or modern implementations, but at its core encryption is the application of field of study we call out of cryptology. I’m so you there’s going to be a bit of confusion with cryptocurrency uses the same underlying mat is too obscure and secure content.

So that only people who have the key can unlock that data really that simple. So where we seeing person popping up for rest and data in transit. So with what I mean by that is encrypting data at rest means date of it sitting on a hard drive on a thumb drive.

It’s sitting in storage. So we want to make sure that anybody who has access to that storage can only access are allowed to use encryption encryption right now probably powder iPhone. It’s in crooked write your passcode actually unlocks a series of keys that unlock the all this crazy layer of encryption because that’s encrypting data address.

And doesn’t have your password that phone is useless to them. They can plug it into a computer that can plug it into analysis machine. But the goal is to make that data inaccessible. The other form of that. We commonly uses encryption and encrypting data in transit. So you see this all the time when you’re doing banking transactions online that little padlock in your browser.

I’m indicates that encryption is a muse. So the website you’re connecting to has a public essentially and what you do is you on allow people to see the public that then encrypt the data that uses of a certain type of math function to locked away for the matching private heated.

He can unlock that data. So when we talked about public key private key. These are just two really big prime numbers that form these keys in the public. He can obviously Republican shared the private key needs to be held secure and that’s the real key around in Christians the same way works at rest as well as ensuring no pun intended as private because as soon as that private key is leaked or someone gains access to it.

Is it the person needs a set of those keys and they will it will walk away the data with one of those keys so far away with a private and public use the private key to unlock the door. Digital signatures are very similar to encryption. Find to lock it away just to unlock a tiny bit of it as part of an interesting little use there.

So there’s a whole bunch of different types of encryption public-private. He’s the most common and there’s a whole bunch of different type of what we call ciphers, which is the algorithm. I’m used to encrypt the data and the whole goal here is to have a really complicated Cipher that you don’t have to worry about as the end-user but that it makes it harder for people to break to encryption is all about making sure that the data so hard to get at that.

It’s not worth the attackers time just because data is encrypted doesn’t mean it’s impossible to get it. So that’s a really important fact is any person we know will be broken. That’s just how it’s been we’ve been using encryption since you know hundreds and hundreds of years in different forms.

This is just the latest form with using these public and private keys. I am and we know we have Cryptographers and we have these are people who use cryptography or to encrypt things. I’m and we have our attackers who are trying to get at that and it’s just a matter of this point of computation of cost.

So how much effort is it required to break the encryption and quite often we talked about the strength of encryption. I’m in terms of computational the years that it will take to break. So if you mess up and that’s most the time when we see in person being messed up is because somebody’s messed up in the implementation the math still holds up at somebody made a mistake.

They expose that he or they picked a small number for that key encryption easy to break up with a strong enough algorithm with a song of level of math that it’s going to take Eons years and years and years and years of a lot of computing strength to break so that by the time it was broken that data was probably no longer relevant.

You think let me know. Hit me up online at Mark MCA in the comment Down Below on the email me at Market again. This whole point of this basic series get out some of that terminology work with you guys work with the audience here. Try to figure out what makes sense.

What doesn’t wear Terry’s we need to focus on to make a little bit of a tighter video series that I’m going to publish it under the Trend Micro to help people have an easy reference. So I am a general audience. What is all this stuff mean? I hope you are set up for a fantastic day.

I will talk to you online and I will see you on the show tomorrow for episode 101. Good morning, everybody. How you doing today? Welcome to episode 100 of mornings with Mark. That’s kind of crazy to me that we made it to episode 100 you for sticking with me throughout this journey on I think it’s been a lot of fun and hopefully you feel the same trip ship encryption is something that a lot of people use is a word as kind of Hit the mainstream vocabulary.

We see it clearly understand what exactly is a I’m just a really high level refers to a number of modern Technologies or modern implementations, but at its core encryption is the application of field of study we call out of cryptology. I’m so you there’s going to be a bit of confusion with cryptocurrency uses the same underlying mat is too obscure and secure content.

So that only people who have the key can unlock that data really that simple. So where we seeing person popping up for rest and data in transit. So with what I mean by that is encrypting data at rest means date of it sitting on a hard drive on a thumb drive.

It’s sitting in storage. So we want to make sure that anybody who has access to that storage can only access are allowed to use encryption encryption right now probably powder iPhone. It’s in crooked write your passcode actually unlocks a series of keys that unlock the all this crazy layer of encryption because that’s encrypting data address.

And doesn’t have your password that phone is useless to them. They can plug it into a computer that can plug it into analysis machine. But the goal is to make that data inaccessible. The other form of that. We commonly uses encryption and encrypting data in transit. So you see this all the time when you’re doing banking transactions online that little padlock in your browser.

I’m indicates that encryption is a muse. So the website you’re connecting to has a public essentially and what you do is you on allow people to see the public that then encrypt the data that uses of a certain type of math function to locked away for the matching private heated.

He can unlock that data. So when we talked about public key private key. These are just two really big prime numbers that form these keys in the public. He can obviously Republican shared the private key needs to be held secure and that’s the real key around in Christians the same way works at rest as well as ensuring no pun intended as private because as soon as that private key is leaked or someone gains access to it.

Is it the person needs a set of those keys and they will it will walk away the data with one of those keys so far away with a private and public use the private key to unlock the door. Digital signatures are very similar to encryption. Find to lock it away just to unlock a tiny bit of it as part of an interesting little use there.

So there’s a whole bunch of different types of encryption public-private. He’s the most common and there’s a whole bunch of different type of what we call ciphers, which is the algorithm. I’m used to encrypt the data and the whole goal here is to have a really complicated Cipher that you don’t have to worry about as the end-user but that it makes it harder for people to break to encryption is all about making sure that the data so hard to get at that.

It’s not worth the attackers time just because data is encrypted doesn’t mean it’s impossible to get it. So that’s a really important fact is any person we know will be broken. That’s just how it’s been we’ve been using encryption since you know hundreds and hundreds of years in different forms.

This is just the latest form with using these public and private keys. I am and we know we have Cryptographers and we have these are people who use cryptography or to encrypt things. I’m and we have our attackers who are trying to get at that and it’s just a matter of this point of computation of cost.

So how much effort is it required to break the encryption and quite often we talked about the strength of encryption. I’m in terms of computational the years that it will take to break. So if you mess up and that’s most the time when we see in person being messed up is because somebody’s messed up in the implementation the math still holds up at somebody made a mistake.

They expose that he or they picked a small number for that key encryption easy to break up with a strong enough algorithm with a song of level of math that it’s going to take Eons years and years and years and years of a lot of computing strength to break so that by the time it was broken that data was probably no longer relevant.

You think let me know. Hit me up online at Mark MCA in the comment Down Below on the email me at Market again. This whole point of this basic series get out some of that terminology work with you guys work with the audience here. Try to figure out what makes sense.

What doesn’t wear Terry’s we need to focus on to make a little bit of a tighter video series that I’m going to publish it under the Trend Micro to help people have an easy reference. So I am a general audience. What is all this stuff mean? I hope you are set up for a fantastic day.

I will talk to you online and I will see you on the show tomorrow for episode 101.

More Content