From the course: Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Cert Prep by Microsoft Press
Unlock this course with a free trial
Join today to access over 24,000 courses taught by industry experts.
Describe encryption and hashing
From the course: Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Cert Prep by Microsoft Press
Describe encryption and hashing
- Understanding security and compliance concepts. Describe encryption and hashing. Encryption and hashing are two important security technologies used by Microsoft to protect data and systems from unauthorized access and tampering. Encryption is the process of converting plain text data into something that appears to be random and meaningless, ciphertext. The encryption process requires an algorithm and a key. The algorithm defines how data is transformed from plain text into ciphertext, and back into plain text. A key is a random string of data used to input into the algorithm. All of the security of the process is contained within the key. There are two types of encryption. Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses different but mathematically related keys to perform encryption and decryption. Encryption is the process of converting data into a…
Contents
-
-
-
-
Learning objectives28s
-
(Locked)
Describe the shared responsibility model4m 18s
-
(Locked)
Describe defense in depth4m 25s
-
(Locked)
Describe the Zero-Trust model2m 24s
-
(Locked)
Describe encryption and hashing3m 13s
-
(Locked)
Describe governance, risk, and compliance (GRC) concepts3m 49s
-
(Locked)
Lesson one: Recap1m 33s
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-