Recently Updated Pages
The mechanisms of authorization
Access is as much about authorization as it is about authentication. One of the most impo...
Why we audit user activity
Have you ever wondered if your employer is keeping a record of when you log into company sy...
Tim: Finding purpose in protecting assets
My name is Tim and I work on the Detection and Response team at Google. You can think of us as ...
Identity and access management
Security is more than simply combining processes and technologies to protect assets. Instead, sec...
Welcome to week 3
Wow! We've covered a lot together! It's hard to believe we've reached the midpoint of thi...
Wrap-up; Terms and definitions from Course 5, Week 2
Our focus in this section was on a major theme of security: protecting assets. A large pa...
Information privacy: Regulations and compliance
Security and privacy have a close relationship. As you may recall, people have the right to contr...
Heather: The importance of protecting PII
Hello, my name is Heather and I'm the Vice President of Security Engineering at Goo...
Fundamentals of cryptography
The internet is an open, public system with a lot of data flowing through it. Even though...
Public key infrastructure PKI
Computers use a lot of encryption algorithms to send and store information online. They'r...
Symmetric and asymmetric encryption
Previously, you learned these terms: Encryption: the process of converting data from a read...
Symmetric and asymmetric encryption
Previously, you learned these terms: Encryption: the process of converting data f...
Non-repudiation and hashing
We've spent some time together exploring a couple forms of encryption. The two types we'v...
Security guidelines in action
Organizations often face an overwhelming amount of risk. Developing a security plan from the begi...
The emergence of cloud security
One of the most significant technology developments this century has been the emergence of cloud ...
Elements of a security plan
Security is all about people, processes, and technology. It's a team effort, and I mean t...
The NIST Cybersecurity Framework
Having a plan is just one part of securing assets. Once the plan is in action, the other ...
The data lifecycle
Organizations of all sizes handle a large amount of data that must be kept private. You learned t...
Welcome to week 2
I was fascinated by a world-wide malware event that happened in 2017. I started watching ...
Security controls
These days, information is in so many places at once. As a result, organizations are unde...