• About
  • Advertise
  • Privacy & Policy
  • Contact
Sunday, October 1, 2023
Earth-News
  • Home
  • Business
  • Entertainment
    Golden Week: Chinese Tourists Flock to Destinations Near and Far

    Golden Week: Chinese Tourists Flock to Destinations Near and Far

    A Short History of Shanghai’s Free Trade Zone

    A Short History of Shanghai’s Free Trade Zone

    Supermodels, suits and star power: Loewe, Givenchy, Schiaparelli, Carven and Chloe Paris runways

    Supermodels, suits and star power: Loewe, Givenchy, Schiaparelli, Carven and Chloe Paris runways

    Blackpink’s Rosé boosts Rimowa x Tiffany, plus global collabs

    Blackpink’s Rosé boosts Rimowa x Tiffany, plus global collabs

    How brands can best maximize Chinese apps Xiaohongshu, Douyin, Weibo and Zhihu

    How brands can best maximize Chinese apps Xiaohongshu, Douyin, Weibo and Zhihu

    Alan Wake 2: Release Date, Gameplay Updates, Story Details, and Latest News

    Alan Wake 2: Release Date, Gameplay Updates, Story Details, and Latest News

  • General
  • Health
  • News
    The Walrus Reflects on Canada’s History on the Third ​​National Day for Truth and Reconciliation

    The Walrus Reflects on Canada’s History on the Third ​​National Day for Truth and Reconciliation

    Taylor Swift & Travis Kelce Surface on East Coast Ahead of Chiefs Game

    Taylor Swift & Travis Kelce Surface on East Coast Ahead of Chiefs Game

    Alexander McQueen’s Sarah Burton Debuts Final Collection as CD

    Alexander McQueen’s Sarah Burton Debuts Final Collection as CD

    Rep. Jamaal Bowman Pulls Capitol Fire Alarm Ahead of Spending Bill Vote

    Rep. Jamaal Bowman Pulls Capitol Fire Alarm Ahead of Spending Bill Vote

    Lil Tay Explains Absence During Livestream, Slams Dad & Defends Mom

    Lil Tay Explains Absence During Livestream, Slams Dad & Defends Mom

    Beyoncé Due to Get Next AMC Concert Movie After Taylor Swift

    Beyoncé Due to Get Next AMC Concert Movie After Taylor Swift

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Tech
    UK tech sector ‘let down’ and ‘betrayed’ over Rishi Sunak’s net-zero policy tweaks

    UK tech sector ‘let down’ and ‘betrayed’ over Rishi Sunak’s net-zero policy tweaks

    First subpostmaster Horizon conviction overturned in Scotland

    First subpostmaster Horizon conviction overturned in Scotland

    US lawmakers write to AI firms about ‘gruelling’ work conditions

    US lawmakers write to AI firms about ‘gruelling’ work conditions

    Businesses disconnected from realities of API security

    Businesses disconnected from realities of API security

    Automated cloud IR: Empowering cyber with AI-powered playbooks

    Automated cloud IR: Empowering cyber with AI-powered playbooks

    Intel Kicks Off High-Volume EUV Production at Irish Plant

    Intel Kicks Off High-Volume EUV Production at Irish Plant

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    Golden Week: Chinese Tourists Flock to Destinations Near and Far

    Golden Week: Chinese Tourists Flock to Destinations Near and Far

    A Short History of Shanghai’s Free Trade Zone

    A Short History of Shanghai’s Free Trade Zone

    Supermodels, suits and star power: Loewe, Givenchy, Schiaparelli, Carven and Chloe Paris runways

    Supermodels, suits and star power: Loewe, Givenchy, Schiaparelli, Carven and Chloe Paris runways

    Blackpink’s Rosé boosts Rimowa x Tiffany, plus global collabs

    Blackpink’s Rosé boosts Rimowa x Tiffany, plus global collabs

    How brands can best maximize Chinese apps Xiaohongshu, Douyin, Weibo and Zhihu

    How brands can best maximize Chinese apps Xiaohongshu, Douyin, Weibo and Zhihu

    Alan Wake 2: Release Date, Gameplay Updates, Story Details, and Latest News

    Alan Wake 2: Release Date, Gameplay Updates, Story Details, and Latest News

  • General
  • Health
  • News
    The Walrus Reflects on Canada’s History on the Third ​​National Day for Truth and Reconciliation

    The Walrus Reflects on Canada’s History on the Third ​​National Day for Truth and Reconciliation

    Taylor Swift & Travis Kelce Surface on East Coast Ahead of Chiefs Game

    Taylor Swift & Travis Kelce Surface on East Coast Ahead of Chiefs Game

    Alexander McQueen’s Sarah Burton Debuts Final Collection as CD

    Alexander McQueen’s Sarah Burton Debuts Final Collection as CD

    Rep. Jamaal Bowman Pulls Capitol Fire Alarm Ahead of Spending Bill Vote

    Rep. Jamaal Bowman Pulls Capitol Fire Alarm Ahead of Spending Bill Vote

    Lil Tay Explains Absence During Livestream, Slams Dad & Defends Mom

    Lil Tay Explains Absence During Livestream, Slams Dad & Defends Mom

    Beyoncé Due to Get Next AMC Concert Movie After Taylor Swift

    Beyoncé Due to Get Next AMC Concert Movie After Taylor Swift

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Tech
    UK tech sector ‘let down’ and ‘betrayed’ over Rishi Sunak’s net-zero policy tweaks

    UK tech sector ‘let down’ and ‘betrayed’ over Rishi Sunak’s net-zero policy tweaks

    First subpostmaster Horizon conviction overturned in Scotland

    First subpostmaster Horizon conviction overturned in Scotland

    US lawmakers write to AI firms about ‘gruelling’ work conditions

    US lawmakers write to AI firms about ‘gruelling’ work conditions

    Businesses disconnected from realities of API security

    Businesses disconnected from realities of API security

    Automated cloud IR: Empowering cyber with AI-powered playbooks

    Automated cloud IR: Empowering cyber with AI-powered playbooks

    Intel Kicks Off High-Volume EUV Production at Irish Plant

    Intel Kicks Off High-Volume EUV Production at Irish Plant

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Tech

Security Think Tank: A user’s guide to encryption

September 19, 2023
in Tech
Security Think Tank: A user’s guide to encryption
Share on FacebookShare on Twitter

Table of Contents

  • The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the impact of quantum
    • The basics
    • Challenges to consider
    • The risk of ‘backdoor’ access
    • Key management and password managers
    • Encryption: one part of the protection puzzle

The Security Think Tank assesses the state of encryption technology, exploring topics such as cryptographic techniques, data-masking, the legal ramifications of end-to-end encryption, and the impact of quantum

Andrew Morris

By

Andrew Morris,
Turnkey Consulting

Published: 18 Sep 2023

Encryption is a key component of everyday life for most people, whether messaging on WhatsApp, shopping online, reading articles over a secure HTTPS connection, or protecting their passwords when logging into an application or website.

Within the organisation, preventing unauthorised access and safeguarding privacy relies on the encryption of most of the services used on a daily basis; running in the background to provide secure traffic and communication, it covers connections via VPNs and end-to-end network connections, access to servers, computers and cloud applications, and password protection services. Even something as seemingly simple as an email uses secure and encrypted transmission to ensure only the sender and receiver can read the messages.

The basics

Encryption minimises the plain text communications between systems and servers; should a threat actor access an organisation’s systems, encrypted traffic makes it much harder for data on the network to be read, or for malware – which could cripple an organisation’s data – to be injected.

Encryption can be undertaken using encryption software, encryption-enabled storage devices, or encryption-enabled networks to secure sensitive data. It can be used to protect data both in transit and at rest (being stored) and requires ‘keys’ to both ‘lock’ (encrypt) and ‘unlock’ (decrypt) the information being guarded. Symmetric encryption means both the sender and receiver of the information must use the same key to encrypt and decrypt, while two different keys are required for asymmetric encryption.

The cryptographic algorithm – an amalgamation of mathematical ingenuity and digital resilience – at the heart of the encryption being utilised determines how robust the encryption is in practice. From venerable algorithms such as RSA (Rivest-Shamir-Adleman) and AES (Advanced Encryption Standard) to contemporary innovations like quantum-resistant encryption, these constitute the bedrock of digital protection.

Challenges to consider

But encryption works both ways – malicious actors can also encrypt data. At-rest data stored as plain text can be encrypted to initiate a ransomware attack in which the key needed to decrypt the data will only be provided if a ransom is paid (and even this is far from a given). Data backups can be a solution but work only if that data is sufficiently protected to stop it being encrypted by a malicious actor.

The lower cost and ease of implementation of cloud-based solutions such as SaaS applications also adds complexity; managed by third-party vendors, they introduce ambiguity around where the organisation’s ‘network’ ends, while data is only as secure as the external service; enterprises need to ensure that the provider uses encryption for the data at-rest and in-transit.

The emergence of quantum computing also poses major questions, as the sheer power of this technology will potentially reduce the time for traditional encryption methods to be successfully attacked from years to seconds. Post-quantum cryptography is a highly specialised area of research focused on developing algorithms that can withstand quantum attacks; time will tell whether this is robust enough for encryption to be a viable option in the future.

The risk of ‘backdoor’ access

End-to-end encryption is the equivalent of having secret conversations in a super-secure room that only specific people can enter. However, on occasion, the rules around this type of security can clash with law enforcement requirements, with much of this having its roots in anti-terrorism measures as governments call for the right to incept end-to-end messaging.

The problem is that government and law enforcement cannot have ‘backdoor’ access to encrypted data without that same backdoor being exploited by malicious actors. It will require companies to use a state-recommended supplier for encryption, with anything else deemed non-compliant.

Equally, an outright ban on secure communications has significant ethical and practical ramifications, both for the individual and the enterprise; quite apart from peoples’ fundamental right to personal privacy, referring to the opening paragraphs, encryption is the behind-the-scenes security enabler of countless online activities. Restricting or severely compromising encryption would render many of these insecure – from online shopping to secure connections into networks; it would also make it impossible to transfer data or protect personally identifiable information (PII), meaning many businesses would be unable to operate.

The incompatibility of secure communications and back door rights is marked by the threats of many messaging companies to withdraw from countries where access to their systems is demanded by those in power; should their services no longer be available, it would further exacerbate the ability of many organisations to do business in these territories.

One of the biggest challenges for encryption therefore is intelligently navigating the delicate balance between privacy and legal regulations which many governments are looking to address.

Key management and password managers

While encryption is a great tool for protecting data, it is only as strong as an organisation’s key management processes.

For example, an inventory of all encryption keys ensures a central and holistic view of all the keys relied on to keep data safe, making losing track of a key less likely and providing a record of the information that is encrypted. Keys need to be stored securely and an appropriate disaster recovery plan put in place to minimise impact in the event of a breach. Monitoring the usage and frequency of keys is also important, while access control manages who can use keys and what they can do with them.

Effective key management also covers revocation, in which encryption keys are removed and replaced in the event of a (key) loss or compromise.

There are additional activities that organisations can undertake to reinforce their encryption activities. Training people to use encrypted password managers reduces the risk of usernames and passwords being exposed (written on notepads or saved on shared drives, for example), while controls can be put in place to ensure everyone is adopting this practice. And patching vulnerabilities on hardware and software that uses encryption, and checking for regular updates, is essential. 

Encryption: one part of the protection puzzle

While encryption is highly effective, organisations should adopt a ‘defence-in-depth’ approach. Maintaining multiple levels of security measures, including network segmentation, firewalls, and intrusion detection systems, alongside encryption of key assets and communications helps to protect their vital data assets from those who should not have access to them.

Read more on Regulatory compliance and standard requirements


Honeywell goes quantum to protect utilities from future threats

AlexScroxton

By: Alex Scroxton


Prepare for quantum to fundamentally change PKI effectiveness


Explore the impact of quantum computing on cryptography

RyanArel

By: Ryan Arel


What’s happening with quantum-safe cryptography?

CliffSaran

By: Cliff Saran

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : Computer Weekly – https://www.computerweekly.com/opinion/Security-Think-Tank-A-users-guide-to-encryption

Tags: securitytechnologythink
Previous Post

Government seeks industry views on cyber threat to UK CNI

Next Post

CMA focuses on data for AI foundation model

Is That Really Asa Butterfield’s Penis in Sex Education Season 4?

Is That Really Asa Butterfield’s Penis in Sex Education Season 4?

September 30, 2023
The Rock Builds His Massive Chest With This Dumbbell Staple

The Rock Builds His Massive Chest With This Dumbbell Staple

September 30, 2023
Gen V Follows The Boys Lead—With Another Incredible Soundtrack

Gen V Follows The Boys Lead—With Another Incredible Soundtrack

September 30, 2023
The 63 Best Stocking Stuffers for Men, Vetted by Lifestyle Editors

The 63 Best Stocking Stuffers for Men, Vetted by Lifestyle Editors

September 30, 2023
Learn More About Travis Kelce’s Dating History In the Unhinged E! Dating Show Catching Kelce

Learn More About Travis Kelce’s Dating History In the Unhinged E! Dating Show Catching Kelce

September 30, 2023
National Day for Truth and Reconciliation event on Parliament Hill provides a time for healing, learning

National Day for Truth and Reconciliation event on Parliament Hill provides a time for healing, learning

September 30, 2023
Youth arrested in connection with stabbing at business in Rockland

Youth arrested in connection with stabbing at business in Rockland

September 30, 2023
Ottawa police set up ‘safe-trade zones’ for person-to-person sales

Ottawa police set up ‘safe-trade zones’ for person-to-person sales

September 30, 2023
The Walrus Reflects on Canada’s History on the Third ​​National Day for Truth and Reconciliation

The Walrus Reflects on Canada’s History on the Third ​​National Day for Truth and Reconciliation

September 30, 2023
Taylor Swift & Travis Kelce Surface on East Coast Ahead of Chiefs Game

Taylor Swift & Travis Kelce Surface on East Coast Ahead of Chiefs Game

September 30, 2023
Partenaires
afric.info
europ.info
usa-news
lesmeilleureschaussures.fr
goodsforyoutoday.com
looktopbeauty.com
keto-diet.biz
soccernews.info
nba-news.net
sportsprblog.com compar.biz
the-best.top
bestchoices.biz
expert-plus.fr
travel-mag.info
pksportsnews.com
news-sports.org

Categories

Archives

October 2023
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  
« Sep    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (3,693)
  • Entertainment (3,778)
  • General (2,769)
  • Health (1,809)
  • News (4,256)
  • Science (2,907)
  • Sports (3,920)
  • Tech (2,860)

Recent News

Is That Really Asa Butterfield’s Penis in Sex Education Season 4?

Is That Really Asa Butterfield’s Penis in Sex Education Season 4?

September 30, 2023
The Rock Builds His Massive Chest With This Dumbbell Staple

The Rock Builds His Massive Chest With This Dumbbell Staple

September 30, 2023
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version

Security Think Tank: A user’s guide to encryption- https://www.maquillages.info/   https://maquillages.org   https://www.deguisements-fetes.fr   https://maillots-de-bain-shop.com   https://www.le-noeud-papillon.com   https://www.jeepeg.fr   https://maillotde-bain.com   https://pushkarvisit.com   -/- According to Luke Fickell, Wisconsin is ‘all-in’ on NIL   Barbie film hits $1bn mark at global box office   Zhuhai Championships: Andy Murray loses to Aslan Karatsev in last 16   Breece Hall named Jets’ offensive X-factor for 2023   Soundking AK20 BA Amplificateur pour Basse   -*-$$DAKINE Split Roller Mallette ordinateur à roulettes, 21 cm, 110 L, Carbon   Veuve Clicquot – Coffret Retraite V.Clicquot Rose   Enceinte Mobile 700W Sono Active DJ KARAOKE 12″ Autonome Batterie à LED RVB + Micro VHF USB/SD/Bluetooth – LedWood Boostar1400   Volkswagen: IT-Störung bei Volkswagen behoben   Newcastle adds BetMGM UK to its bookmaker alliances   $$* Amalia   El Rancho Place d’Italie, Centre commercial Italie 2, place d’Italie 75013 Paris   Security Think Tank: A user’s guide to encryption *Security Think Tank: A user’s guide to encryption