From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep
Privacy and confidentiality
From the course: CompTIA Advanced Security Practitioner (CASP+) (CAS-004) Cert Prep
Privacy and confidentiality
- Let's talk about privacy and confidentiality requirements and how they can be met using cryptography and public key infrastructure. First, what is privacy? When dealing with data security, we consider privacy to have been achieved if we have the ability to protect sensitive information about somebody's personal identifiable information. Now, confidentiality is considered to be more broad than privacy because we expand our definition to cover protecting data against unintentional, unlawful, or unauthorized access, disclosure, or theft of any sensitive information. Often though, people are going to use these two terms interchangeably in the cybersecurity world of privacy and confidentiality. Now, in order to achieve privacy or confidentiality, we need to put security controls in place when we design our security architectures for our enterprise networks. The most common technology used to protect privacy and confidentiality of our data is to implement encryption using cryptography and public key infrastructure. Now, cryptography is broken down into two main types based upon the type of keys that are used to protect the data. These are symmetric key encryption and asymmetric key encryption. With symmetric key encryption, the same key is used for both the person transmitting or storing the data and the person who receives or reads the data. For example, if you're storing files on a BitLocker encrypted hard drive on a Windows computer, you're using symmetric encryption to store those files on the drive and again to read those files from the drive and you're doing that with the same key. Asymmetric encryption instead uses two keys, a public key and a private key, which is supported by a public key infrastructure or PKI system. When you send an email to a colleague at work and encrypt it, you're usually doing this using an asymmetric key. Now, first, your email client is going to take the message that you want to send, and it's going to encrypt it using the recipient's public key, which it gets by going to the PKI system. Then the message is sent over to the receiver, and once it's received, their email client will decrypt that message using their own private key. Because each person using PKI has both a public and a private key, this key pair can be used to encrypt and decrypt the contents of a message. If the public key is used to encrypt it, then the matching private key must be used to decrypt it. This is how privacy and confidentiality is maintained because only the individuals themself have a copy of their private key, but everybody can access their public key from a central authoritative server. This means only the person who's receiving it and using their private key can actually open that message and read it. Now, when might you want to use symmetric key encryption versus asymmetric key encryption as your solution? Well, a symmetric key encryption system is preferred anytime you value speed because it's about a thousand times faster than an equivalently secure asymmetric key system. If you're going to send a lot of data, using a symmetric key encryption is going to make a lot of sense because it can handle more data at any given time due to its increased speed. But if symmetric key is so wonderful, why do we even need asymmetric key encryption? Well, it comes down to the concept of key distribution. Remember, with symmetric key encryption, we're using the same key to encrypt and decrypt the data. So if I want to send an email to you and I encrypt it using a symmetric key encryption, that means I need to have a way to give you that key before I send you the email. Otherwise, you won't be able to decrypt it. Additionally, if I wanted to send an email to somebody else, let's say my friend Scott, I need to share a different key between Scott and myself. So now the two of us are able to communicate privately without you or anybody else being able to read the messages we send. So now I have two keys, one for me and you and one for me and Scott. So if I'm using symmetric key encryption for sending my emails, I'm literally going to need hundreds or thousands of different keys, and each individual key would need to be shared between me and the person I want to securely communicate with. As you can see, this gets to be really cumbersome and impractical pretty darn quickly. So instead, we use asymmetric encryption because now each person only needs to have two keys, a private key and a public key. Those public keys are well public, so anybody can have a copy of your public key. It can just be hosted on a centralized server for example. Now when I want to send you a message, I can connect to the trusted centralized server and get your public key. Then I use your public key to encrypt the message I want to send. This completely eliminates the key distribution challenges that are experienced with symmetric key encryption, but we still have the issue of speed because asymmetric encryption is a thousand times slower than symmetric key encryption for sending emails. This really isn't too big of a deal because it's an asynchronous process anyway, but for other applications, this would create a massive bottleneck in our systems. So to overcome this, we can use a hybrid solution and combine both symmetric and asymmetric solutions together. For example, let's say you want to connect to an e-commerce website like amazon.com, you're first going to get a copy of Amazon's public key from the centralized server. Your computer then chooses a long random string of numbers and encrypts that string using the public key for Amazon server. When the Amazon server receives that encrypted string, it can then use the private key that it has to decrypt it. This portion of the process is a symmetric, and we're using PKI here. Now, the server takes that random long string, and it uses that to initiate a secure encrypted connection between my client using a symmetric key encryption method and their server. Now, we have securely exchanged a symmetric key since I just created it and I already know what it is, and then I send it over using an asymmetric model so that the server also has that key using PKI. This allows us to use the slower asymmetric encryption to do our key exchange, which is relatively a small amount of data. So the slower speed isn't a major issue here, but once we both have that same shared secret, we can establish a symmetric encryption path between the client and the server and use that for the bulk of our data transfer, such as browsing on Amazon to buy a new textbook or even to watch some videos from the site. In addition to encryption, enterprise architects also use authentication mechanisms like passwords, smart cards, key fobs, biometric verification, and others to ensure only authorized people can access a particular resource on a given network. So remember, encryption is the most commonly used technology when it comes to meeting the privacy and confidentiality requirements for your security architecture. To provide this confidentiality, you need to use either a symmetric key encryption algorithm or an asymmetric key encryption algorithm where the sender of the data uses the receiver's public key to secure that data. (bright upbeat music)
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
Securing networks6m 48s
-
Switches7m 27s
-
(Locked)
Routers8m 27s
-
(Locked)
Wireless and mesh3m 23s
-
(Locked)
Firewalls11m 30s
-
(Locked)
Proxies6m 59s
-
(Locked)
Gateways4m 39s
-
(Locked)
IDS and IPS6m 29s
-
(Locked)
Network access control2m 56s
-
(Locked)
Remote access8m 59s
-
(Locked)
Unified communication19m 8s
-
(Locked)
Cloud vs. on-premises4m 49s
-
(Locked)
DNSSEC4m 16s
-
(Locked)
Load balancer6m 48s
-
-
-
Securing architectures1m 16s
-
Traffic mirroring4m 23s
-
(Locked)
Network sensors11m 46s
-
(Locked)
Host sensors6m 15s
-
(Locked)
Layer 2 segmentation5m 14s
-
(Locked)
Network segmentation13m 14s
-
(Locked)
Server segmentation10m 51s
-
(Locked)
Zero trust6m 37s
-
(Locked)
Merging networks5m 32s
-
(Locked)
Software-defined networking5m 27s
-
-
-
Cloud and virtualization1m 6s
-
Cloud deployment models4m 34s
-
(Locked)
Cloud service models5m 7s
-
(Locked)
Deployment considerations4m 57s
-
(Locked)
Provider limitations2m 59s
-
(Locked)
Extending controls5m 6s
-
(Locked)
Provisioning and deprovision2m 59s
-
(Locked)
Storage models5m 22s
-
(Locked)
Virtualization7m 56s
-
-
-
Authentication and authorization1m 44s
-
Access control4m 47s
-
(Locked)
Credential management4m 27s
-
(Locked)
Password policies8m 2s
-
(Locked)
Multifactor authentication8m 25s
-
(Locked)
Authentication protocols10m
-
(Locked)
Federation7m 2s
-
(Locked)
Root of trust4m 24s
-
(Locked)
Attestation2m 14s
-
(Locked)
Identity proofing3m 33s
-
-
-
Emerging technology4m 18s
-
Artificial intelligence and machine learning8m 55s
-
(Locked)
Deep learning8m 58s
-
(Locked)
Big data4m 40s
-
(Locked)
Blockchain distributed consensus5m 36s
-
(Locked)
Passwordless authentication5m 17s
-
(Locked)
Homomorphic encryption3m 37s
-
(Locked)
Virtual and augmented reality4m 32s
-
(Locked)
3D printing3m 3s
-
(Locked)
Quantum computing5m 34s
-
-
-
(Locked)
Threat and vulnerability management1m 56s
-
(Locked)
Threat intelligence6m 19s
-
(Locked)
Threat hunting6m 43s
-
(Locked)
Intelligence collection11m 9s
-
(Locked)
Threat actors9m 21s
-
(Locked)
Threat management frameworks12m 45s
-
(Locked)
Vulnerability management activities11m 44s
-
(Locked)
Security Content Automation Protocol7m 21s
-
(Locked)
-
-
(Locked)
Analyzing vulnerabilities1m 22s
-
(Locked)
Race conditions4m 58s
-
(Locked)
Buffer overflows12m 27s
-
(Locked)
Authentication and references5m 56s
-
(Locked)
Ciphers and certificates10m 46s
-
(Locked)
Improper headers6m 9s
-
(Locked)
Software composition9m 49s
-
(Locked)
Vulnerable web applications11m 45s
-
(Locked)
-
-
(Locked)
Attacking vulnerabilities1m 15s
-
(Locked)
Directory traversals9m 48s
-
(Locked)
Cross-Site Scripting (XSS)8m 59s
-
(Locked)
Cross-site request forgery (CSRF)7m 15s
-
(Locked)
SQL injections7m 5s
-
(Locked)
XML injections6m 29s
-
(Locked)
Other injection attacks4m 21s
-
(Locked)
Authentication bypass6m 45s
-
(Locked)
VM attacks4m 52s
-
(Locked)
Network Attacks11m 3s
-
(Locked)
Social engineering7m 15s
-
(Locked)
-
-
(Locked)
Enterprise mobility2m 36s
-
(Locked)
Enterprise mobility management9m 36s
-
(Locked)
WPA37m 20s
-
(Locked)
Connectivity options8m 48s
-
(Locked)
Security configurations8m 8s
-
(Locked)
DNS protection3m 15s
-
(Locked)
Deployment options4m 38s
-
(Locked)
Reconnaissance concerns8m
-
(Locked)
Mobile security7m 50s
-
(Locked)
-
-
(Locked)
Endpoint security controls2m 24s
-
(Locked)
Device hardening8m 30s
-
(Locked)
Patching4m 41s
-
(Locked)
Security settings5m 41s
-
(Locked)
Mandatory access controls (MAC)6m 44s
-
(Locked)
Secure boot5m 49s
-
(Locked)
Hardware encryption4m 48s
-
(Locked)
Endpoint protections9m 54s
-
(Locked)
Logging and monitoring6m 14s
-
(Locked)
Resiliency6m 4s
-
(Locked)
-
-
(Locked)
Cloud technologies2m 37s
-
(Locked)
Business continuity and disaster recovery7m 51s
-
(Locked)
Cloud encryption5m 23s
-
(Locked)
Serverless computing8m 54s
-
(Locked)
Software-defined networking (SDN)6m 52s
-
(Locked)
Log collection and analysis4m 22s
-
(Locked)
Cloud application security broker6m 16s
-
(Locked)
Cloud misconfigurations10m 57s
-
(Locked)
-
-
(Locked)
Asymmetric algorithms2m 11s
-
(Locked)
Using asymmetric algorithms9m 28s
-
(Locked)
SSL, TLS, and cipher suites8m 21s
-
(Locked)
S/MIME and SSH7m 27s
-
(Locked)
EAP5m 39s
-
(Locked)
IPSec14m 34s
-
(Locked)
Elliptic curve cryptography (ECC)3m 33s
-
(Locked)
Forward secrecy3m 35s
-
(Locked)
Authenticated encryption with associated data (AEAD)1m 53s
-
(Locked)
Key stretching4m 30s
-
(Locked)
-
-
(Locked)
Public key infrastructure4m 30s
-
(Locked)
PKI components10m 18s
-
(Locked)
Digital certificates7m 44s
-
(Locked)
Using digital certificates5m 40s
-
(Locked)
Trust models4m 28s
-
(Locked)
Certificate management2m 44s
-
(Locked)
Certificate validity: CRL and OCSP3m 48s
-
(Locked)
Protecting web traffic3m 30s
-
(Locked)
Troubleshooting certificates5m 22s
-
(Locked)
Troubleshooting keys3m 35s
-
(Locked)