5 ways to measure the quality of your encryptionIntroductionEncryption has certainly become an increasingly popular topic today. Almost all devices in this world are connected to the Internet and share information. As the number of devices increases, the amount of sensitive data in the information shared between devices, applications and servers also increases on a larger scale. This information must be protected, so that sensitive data remains private. Domain attack today is not just about denial of service or viruses, just like 10 or 15 years ago. Nowadays the attack is increasingly becoming a specific purpose such as data theft, interception, access to sensitive data such as credit card numbers, passwords or perhaps an intellectual property in a company, or the escalation of privileges as if an insider wanted to gain higher-level access or access to higher-level data value in order to dispose or sell it. The number of attack services is also increasing with cloud computing or mobile devices, we have many applications on different devices. Additionally, sensitive data is being located in more and more places, so there are more potential weaknesses to exploit. Body To defend this, the principle of layered security is still a choice. It is the application that runs the business and that is why there is a good mix between traditional tools and modern technology applied in this area. When applying security level, people typically base it on risk, applying the highest level of protection to the riskiest, riskiest, and most valuable application. So what's happening now is that critical applications (or the most risky and valuable ones) are performing encryption in the form of encryption... middle of paper... to allow hackers to penetrate the system. After seeing and listening This seminar, my perspective on cryptography has broadened. What I learned in class and what reality is seems very different. From what I learned in class, encryption seems very good in terms of data protection (confidentiality) and digital signature (authentication) which make it almost impossible for hackers to know the encrypted data or information. But then I don't realize that the most important thing in encryption is the key itself. Even though it seems very difficult to know and obtain the key, hackers still manage to do it. And hackers are usually insiders because insiders usually have more information than outsiders, so it becomes clear that insiders are the more dangerous intruders. References https://www.brighttalk.com/webcast/7537/111117
tags