-
Book Overview & Buying
-
Table Of Contents
The Official (ISC)2 Guide to the CCSP CBK - Second Edition
By :
The need for the use of cryptography and encryption is universal for the provisioning and protection of confidentiality services in the enterprise. In support of that goal, the CCSP should ensure that he understands how to deploy and use cryptography services in a cloud environment. In addition, it’s important to integrate strong key management services and a secure key management lifecycle into the cryptography solution.
The need for confidentiality along with the requirement to apply additional security controls and mechanisms to protect information and communications is great. Whether it is encryption to a military standard or simply the use of self-signed certificates, everyone has different requirements and definitions of what a secure communications and cryptography-based infrastructure looks like. As with many areas of security, encryption can be subjective when you drill down into the algorithms, strengths, ciphers, implementation methods, and so...
Change the font size
Change margin width
Change background colour