Recently Updated Pages
Defense in depth strategy
A layered defense is difficult to penetrate. When one barrier fails, another takes its pl...
Common vulnerabilities and exposures
We've discussed before that security is a team effort. Did you know the group extends wel...
Vulnerability management
For every asset that needs protecting, there are dozens of vulnerabilities. Finding tho...
Wrap-up; Terms and definitions from Course 5, Week 2
Our focus in this section was on a major theme of security: protecting assets. A large pa...
Welcome to week 3
Wow! We've covered a lot together! It's hard to believe we've reached the midpoint of thi...
Identity and access management
Security is more than simply combining processes and technologies to protect assets. Instead, sec...
Tim: Finding purpose in protecting assets
My name is Tim and I work on the Detection and Response team at Google. You can think of us as ...
Why we audit user activity
Have you ever wondered if your employer is keeping a record of when you log into company sy...
The mechanisms of authorization
Access is as much about authorization as it is about authentication. One of the most impo...
The rise of SSO and MFA
Most companies help keep their data safely locked up behind authentication systems. Usernames and...
Access controls and authentication systems
Protecting data is a fundamental feature of security controls. When it comes to keeping i...
The evolution of hash functions
Hash functions are important controls that are part of every company's security strategy. Hashing...
Non-repudiation and hashing
We've spent some time together exploring a couple forms of encryption. The two types we'v...
Symmetric and asymmetric encryption
Previously, you learned these terms: Encryption: the process of converting data f...
Symmetric and asymmetric encryption
Previously, you learned these terms: Encryption: the process of converting data from a read...
Public key infrastructure PKI
Computers use a lot of encryption algorithms to send and store information online. They'r...
Fundamentals of cryptography
The internet is an open, public system with a lot of data flowing through it. Even though...
Heather: The importance of protecting PII
Hello, my name is Heather and I'm the Vice President of Security Engineering at Goo...
Information privacy: Regulations and compliance
Security and privacy have a close relationship. As you may recall, people have the right to contr...
最小権限の原則
translated with "MixerBox translate" using chatgpt4 as i suck at reading japanese still im not su...