Understanding,the,Problem,Data computer Understanding the Problem of Data Security & Encryption


Gone are those times when the companies and the organisations didn't need a hi-tech system to handle them. Owing to the considerable increase in the business sector and thus, an enormous increase in the complexity of the organisational struc ----------------------------------------------------------Permission is granted for the below article to forward,reprint, distribute, use for ezine, newsletter, website,offer as free bonus or part of a product for sale as longas no changes a


Understanding the Problem of Data Security & Encryption A Whitepaper by Stephen Northcutt and Ken SteinbergThe Nature of Data Everything stored on your computer can be divided into exactly two categories: applications and data. Applications do the work and data is what they work on. Data is by far the more valuable.  A case can be made for the value of individual applications, but in reality it is the algorithms they employ, not the applications themselves, which are valuable. Most business people and technology professionals will agree: data is king. Whether in government, banking, telecommunications, medical imaging, manufacturing process control or transportation the secure use of electronic data is the lifeblood of a global economy.Data can be further divided into two very distinct categories: inward facing and outward facing.   Inward facing data is that information, often proprietary in nature that allows a company to produce its goods and services. This data is used internally by employees and the company’s various business components.  Efforts are made to ensure that inward facing data does not leave the organization. Outward facing data is that private information that the company uses to compete in the marketplace.  This “portable” or “mobile” data may be used in sales, customer service and analytical functions that are often used by employees outside the confines of the company proper. The data stored on the laptop of a salesperson is an example of outward facing data. It may be just as sensitive as inward facing data, but it probably is exposed to higher risk.This distinction is particularly important to security professionals as the large number of data breaches in recent years bear witness to the fact that many security professionals do not understand the implications of the differences between protecting inward facing data and outward. While there are occasions when applications themselves need to be secure, more often than not, it is the securing of data that has the biggest impact on business continuity and profits. To achieve this, the successful security officer needs to focus on only two actions—keeping inward data inside and outward data from being acquired, compromised and/or coerced while outside of the corporate environment.Further confusion occurs, when security professionals seek solutions that facilitate successful information assurance but fail to take into account real-world conditions.  These errors result in the inevitable selection of a tool set that becomes burdensome to both the corporation and the operation of its computing systems.  These implementations may survive a few years but are ultimately removed due to their disruptive effect upon the business environment and culture. We predict that many of the organizations rushing to employ full disk encryption today will be retiring these solutions a few years from now.Whole disk encryption will protect against system loss.  The knee-jerk reaction of most IT professionals, when asked to secure portable information, such as laptops, is to blanket an entire system in encryption.  This appears, at first blush, to be the “easy and simple answer.”  What is often miscalculated is the inherent danger of key management.  Whole disk encryption requires that a set of keys be distributed with the encrypted system so that the core applications can subsequently be unencrypted before the system can run.  Transportation of an encryption key with the encrypted information provides opportunity for the encryption to be broken. It is unlikely anyone will find a way to brute decrypt AES 256 encrypted information, but the four digit pin that protects the encryption key is not as much of a challenge to attackShipping the key with the encryption set, or making the safety of the encryption key reliant on the user of the system, also puts the user at risk of harm.  Depending upon the attacker’s level of intent, knowing that the user can provide critical parts of the key, may result in direct or indirect (family members, etc.) threats of harm in order to obtain key information.  In all cases it is better that the user has no knowledge of the key or its seeds.There will be a huge performance penalty to be paid. Encryption of common applications is a performance impacting and unnecessarily burdensome action. Encryption of data, not common applications, mitigates the performance degradation as the operating system is not subject to decryption.The additional and unfortunate issue with encrypting application sets is failure recovery.  When encryption fails or keys are corrupted, unless there is a recovery mechanism, the whole system is lost.  Once corrupted, it is even more difficult to get the system into a working state in order to recover the data.System encryption will not keep data from being stolen.  Hiring employees and consultants implies a level of trust.  Trust, in security, implies access.  In order to conduct business employees must have access to unencrypted information. Encryption is therefore unable to protect the data when it is being used. All encryption efforts must be enhanced with data access logging and data copy protection. Data Proximity – Security that enables data at work. We can apply our understanding of inward and outward facing data, encrypted data at work as well as endpoint security and devise a solution based on Data Proximity. Data Proximity is the ability to access secure data while “proximal” (in the proximity) to the workplace without the worry of key mobility, the overhead of full system encryption, and outward data loss.Data Proximity provides an encrypted data store on each system into which any type of data file can be placed.  Once placed in the data store, the file is encrypted and can only be accessed while the system itself is within connected proximity to the enterprise work environment.  The key necessary for opening the encrypted files can only be accessed when the system is connected to the key store manager which is responsible for key storage and randomization.  Placing and retaining the key store within the corporate infrastructure removes the issue of key mobility and adds the extra security of randomization. Keys are never written to the disk of a client and are therefore not available away from the workplace.This approach is further enhanced by the extensive logging of actions on data (read, writes, deletes) and the disabling of memory-sourced data copies.  Many applications will leave data memory or scratchpad residue, allowing the user to make untracked copies of data to other unknown data files.Data Proximity is designed to be a lightweight information security solution that supports a mobile workforce without negatively impacting their ability to be productive.  When an employee is at work, they should be able to work.  When they are mobile, the ability to access and use data should not be impeded, but the company’s information must be safe from intentional and unintentional security risk.Summary Whole Disk Encryption:Extreme system performance degradation due to Operating System and application decryption overheadTotal system loss if key corruption occursKeys follow the mobile system making them or their users susceptible to compromiseProblematic when mobile systems require new applications or updates.Memory resident copies may be enabled depending on vendor configurationData Proximity:Better overall system performance as compared to whole disk encryptionAll keys are kept at the place of business and do not follow the mobile systemMemory resident copies are disabled.High level of file interaction logging.Employee access to files only while at work (customizable).Systems are always bootable since the operating system is never encryptedControl of external device attachment and use (memory sticks, CD drives, external drive, etc).

Understanding,the,Problem,Data

computer

Equipment Rental Software – Features And Cost

Equipment rental management software is an essential thing these days for any equipment rental company.A well-developed equipment rental software provides you with a variety of features that can really help you maintain and organise your cus ...

computer

5 Big Reasons Why I Migrated From Angularjs To React

I have 5 main reasons for my angularjs to react migration. No, it's not a comparison on which is better. A comparison between apples and oranges would make no point. React is a library, and angular is a framework. Both can do stuff in their ...

computer

How to troubleshoot McAfee error 2318?

Security software means McAfee! For many computer users, McAfee antivirus is the only choice for security software as it provides all the features and tools which are necessary for device and data protection. This robust antivirus merely sho ...

computer

Manage Multiple Counter With AlignBooks Point of Sale

Fulfilling your businesss needs which can grow your firm is our aim. AlignBooks is better known for providing a strong pillar to newly started or midway businesss. Those companies who dont want to fall back with irregularity manage the inven ...

computer

How to Autoplay Embedded YouTube Videos

Source: How to Autoplay Embedded YouTube VideosEmbedding a video or audio enables the users to share their videos with any of their preferred sites or any social networking platforms. They can do so by copying the embedded link of the parti ...

computer

3 Major Mistakes to Avoid in Retail Business

Truth be told, nearly half of the retail businesses survive longer than four years and which can be something to ponder for a newbie before stepping into the industry. However, this being said, it is also true that you can excel in the indus ...

computer

Start Your Own Computer Repair Business

1. Know your street value. In the early 90's, running a PC repair business centered around selling parts and products, with service on the side. Today, it's about selling hours. If you run a business, you need to consider the X3 rule. That m ...

computer

How Establishments Show Up in Restaurant Searches

The revolutionary rise of technology has made things easy-peasy for consumers in the restaurant industry. Unlike the old days, the availability of innumerable platforms has made it possible for diners to choose from various searching options ...

computer

GuildWars 2 :

The last expansion pack for Guild Wars 2 was Path of Fire, which was released in 2017 and brings you a new enemy-Balthazar, the evil god of war. Although this doesn't sound like another expansion pack currently in production, some fans ma ...

computer

Customer Support at the time of COVID-19 Pandemic

COVID-19 is the worst crisis of our time as we observe social distancing protocols being imposed all around the world. While these measures are a step in effectively managing the COVID-19 pandemic, Hospitality and Retail businesses are confr ...

computer

How to Choose a Contract Management Solution (CLM)?

Contract life cycle management (CLM) systems can simplify and automate contract creation, negotiation, execution and storage. They are an intelligent alternative to the tedious hand tools formerly used for these tasks, which lacked visibili ...

computer

Contacting Google Live Person to Resolve Your Issues

Users are fond of all the Google supported products and look forward to the best services. Also, Google as a whole has never disappointed its users and helped them at every point with its commendable services. Also, being a customer-oriente ...

computer

how to uninstall discord

How to Uninstall Discord in Windows 10? has supported open source technologies, our tool is secure and safe to use. To uninstall a discord from your windows, you'll use this method which is given below.USING THIRD PARTY TOOLS1. Firstly, you ...