Database Security - SY0-601 CompTIA Security+ : 3.2

preview_player
Показать описание

- - - - -
Keeping data safe is a challenge when storing information in a database. In this video, you’ll learn about tokenization, hashing, and using a salt.
- - - - -

FOLLOW PROFESSOR MESSER:
Рекомендации по теме
Комментарии
Автор

I really appreciate that you go back to previous topics, like hashes, and explain them again in depth. Just to solidify the info. Thank you!

garrvict
Автор

This might be slightly out of scope - but im interested in how password checking happens when the hash is salted.

The salt is random so how do you compare an input password hash with the salted password hash stored in a database to authenticate a login?

Joe-dyfn
Автор

Question: why would an organization need to store passwords if they would use a hash to do it, but can’t get those passwords back for reference? Is storing passwords in a database just for authentication purposes against the server?

phyliciat.
Автор

2:20
So was Target not using Tokenization in 2013 when the hack happened?

darkchocolate
Автор

Hi I have a question, how do we know the original data in the token if we need it? (Since the tokenization process is not original data) Is there a threat that attackers can actually gain access from the original database bypass the tokenization?

claire
Автор

How do they verify if the credit SSN is real or fake using this method? This method is just hiding the real data but there must be something real to compare the validity

alaukiktandlekar