Recently Updated Pages
Welcome to week 3
Wow! We've covered a lot together! It's hard to believe we've reached the midpoint of thi...
Identity and access management
Security is more than simply combining processes and technologies to protect assets. Instead, sec...
Tim: Finding purpose in protecting assets
My name is Tim and I work on the Detection and Response team at Google. You can think of us as ...
Why we audit user activity
Have you ever wondered if your employer is keeping a record of when you log into company sy...
The mechanisms of authorization
Access is as much about authorization as it is about authentication. One of the most impo...
The rise of SSO and MFA
Most companies help keep their data safely locked up behind authentication systems. Usernames and...
Access controls and authentication systems
Protecting data is a fundamental feature of security controls. When it comes to keeping i...
The evolution of hash functions
Hash functions are important controls that are part of every company's security strategy. Hashing...
Non-repudiation and hashing
We've spent some time together exploring a couple forms of encryption. The two types we'v...
Symmetric and asymmetric encryption
Previously, you learned these terms: Encryption: the process of converting data f...
Symmetric and asymmetric encryption
Previously, you learned these terms: Encryption: the process of converting data from a read...
Public key infrastructure PKI
Computers use a lot of encryption algorithms to send and store information online. They'r...
Fundamentals of cryptography
The internet is an open, public system with a lot of data flowing through it. Even though...
Heather: The importance of protecting PII
Hello, my name is Heather and I'm the Vice President of Security Engineering at Goo...
Information privacy: Regulations and compliance
Security and privacy have a close relationship. As you may recall, people have the right to contr...
最小権限の原則
translated with "MixerBox translate" using chatgpt4 as i suck at reading japanese still im not su...
Principle of least privilege
Security controls are essential to keeping sensitive data private and safe. One of the most commo...
Security controls
These days, information is in so many places at once. As a result, organizations are unde...
Welcome to week 2
I was fascinated by a world-wide malware event that happened in 2017. I started watching ...
The data lifecycle
Organizations of all sizes handle a large amount of data that must be kept private. You learned t...