Protecting Data - SY0-601 CompTIA Security+ : 2.1

Поділитися
Вставка

КОМЕНТАРІ • 23

  • @slyvax3359
    @slyvax3359 3 роки тому +9

    With tokenization, does the token server give a new token once it is used, or does it wait for you to attempt a purchase?

    • @ausmanx1161
      @ausmanx1161 2 роки тому

      I’m pretty sure it works the same as a DUO token.

    • @onemoresmartone
      @onemoresmartone Рік тому

      Tokens are one time use

  • @Brandoncollins-dp8op
    @Brandoncollins-dp8op Рік тому +6

    what if the attacker knows about the token (in the video it's 4545 ...) and then just sends that to the merchant payment server so then it goes step 6 and 7 to gain approval, wouldn't that allow the attacker to use the person's credit card by knowing his/her token is?

    • @professormesser
      @professormesser  Рік тому +19

      The tokens are only good for one use, so any transactions using a previous token would be rejected.

  • @theirresistableE
    @theirresistableE 2 роки тому +3

    so tokenization can only be used with a phone or similar device to interact with the token service server? It won't work when using the chip or slide on a plastic card itself, for example?

    • @professormesser
      @professormesser  2 роки тому +5

      That's correct, the card is going to use the actual card numbers for the transaction instead of a token.

  • @tatertotbot
    @tatertotbot Рік тому +7

    After learning about these attacks from your videos, it seems like Target is quite the target!

  • @mr.e9778
    @mr.e9778 Рік тому +2

    when it comes to IRM, deos this relate to the Zero-trust, RBAC and other similar access control concepts ?

  • @mohammadbrazi7272
    @mohammadbrazi7272 3 роки тому +7

    Is the process of tokenization the same if we used the credit card directly to pay instead of our phones?

    • @professormesser
      @professormesser  3 роки тому +23

      Nope. If you use your credit card, then you're sending your actual credit card information through the system.

    • @mohammadbrazi7272
      @mohammadbrazi7272 3 роки тому +1

      @@professormesser Thank you Professor!

  • @Kovar99YT
    @Kovar99YT 2 роки тому +1

    so is tokenization, spoofing the plain text basically ?, because its still plain text and its not encrypted but it is just something else

  • @MetaphoricMinds
    @MetaphoricMinds Рік тому +1

    @ 9:14, couldn't you just capture the token and replay it? What prevents that from being successful? Or is it a new token every time?

    • @professormesser
      @professormesser  Рік тому +1

      A token can't be reused, so even if it was somehow captured it would be worthless.

  • @halo2bullseye922
    @halo2bullseye922 9 місяців тому

    Thanks for vid!

  • @tomkozlowski5205
    @tomkozlowski5205 3 роки тому +1

    Thanks

  • @littlemarduk22
    @littlemarduk22 5 місяців тому

    Professor Messer... you gotta do cissp one day