
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Video: How is Data Encryption Deployed Today?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"JN4v8EYMoW\"><a href=\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/\">Video: How is Data Encryption Deployed Today?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/video-how-is-data-encryption-deployed-today\/embed\/#?secret=JN4v8EYMoW\" width=\"600\" height=\"338\" title=\"&#8220;Video: How is Data Encryption Deployed Today?&#8221; &#8212; OTAVA\" data-secret=\"JN4v8EYMoW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Online Tech&#8217;s Senior Product Architect Steve Aiello\u00a0continues his data security series of videos on data encryption by explaining how encryption is deployed today and the two different types of decrypting data. Encryption\u00a0involves a series of different mathematical formulas that are applied to character data. You can use either substitution or transposition. Substitution is the example of B=A, A=C. Transposition is scrambling the letters &#8211; for example, take the word &#8216;cat.&#8217; Switching the position of the first letter to the third letter, and the third letter to the first letter results in &#8216;tac.&#8217; So, cat = tac. Many strong encryption algorithms will use a combination of both substitution and transposition. Depending on the type of technology and device you use, the type of algorithms that are being used will be different for each. For example, mobile phones have very low power availability, therefore, mobile phones and desktop PCs would use different encryption methods. Watch the full video on our site. View other videos in the data encryption series here, and check back as we continue to update! Learn more about encryption of data at rest and in transit on our Defense in Depth page. The increased cyber threats of hackers and...","thumbnail_url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg"}