What happen if the data encryption is used by fraud, its result in ransomware malware. Ransomware malware will encrypt the data and if you need to decrypt you need to pay for private key else your private key for decryption will be deleted and you will lose your data permanently.
It’s raising peak now a days and most of the companies are subjected to ransomware, it’s also called as cryptovirus, cryptotrojan and cryptowarm.
How its spreading ? mostly through E-mail attachments, Infected program, and compromised network.
Preventive Measure is through strong firewall setting, using Sandbox environment, having regular backup of all data, if ransomware malware infected wiping the data is best option and restore the data from back-up.
Microsoft announced WhatsApp channel for its new broadcast, It has released WhatsApp Number +971-50-359-2257 for subscribing. More interesting factor is does not sent more than 3-message per day. Regarding security concern, Microsoft guaranteed it will not share the privacy to others .
Its an extension and evaluation for virtualization concept, Cloud Computing is a popular term referring where data storage and process are performed in an unknown place,accessing cloud network can be done through Internet, Its alternative for having our traditional IT infrastructure in our local lan environment to an unknown place, thus reducing the cost of our data center infrastructure and its maintenance.
As it have some flaws also, as the datas are stored in unknown environment security is the main concern, we should have a strong SLA(service level agreement) for down time and data security.secondly we should have a strong internet bandwidth consumption also.
Some of the service of cloud computing are :
we already discussed about symmetric encryption in last post, now lets look deep into asymmetric algorithm its worked based on public and private key, where is in symmetric encryption is based only on pre-shared(private keys) only .
How its works? each party will have a unique public key and private key . If A want to communicate with B, it have to encrypt his plain text with B’s public key, once its encrypted, it can be decrypt only by B’s private key , even A cannot decrypt .
Main advantages of using Asymmetric Algorithm
and disadvantage is ,processing time is relatively slow comparing to Symmetric Encryption algorithm.
its a summary of the message content, and its a concept, is used to map arbitrary size of data to the fixed size,and the value got by the hash function called as hash value.
MD2,MD5, SHA are algorithms for hash function.
Modern Encryption have a common protocol all over the world, only key will kept in secret, modern cryptography divided into three categories.
it uses the same key for encryption and decryption, the key which is used for sharing between two parties commonly know as secret-key or pre-shared key, Main advantages of symmetric encryption its comparatively fast as both end knows same key and key-word should be more complicated if we want to have a secure encryption, Main disadvantages are as key is the only keynote for symmetric encryption transfer of key should be kept highly confidential. below are algorithm support on symmetric encryption
DES – Data Encryption Standard, its also known as data encryption algorithm, it was designed by IBM in 1976 its operating by 5 modes
since the growth of advance technology and invention of high processer leads to DES as not secure one, it had a brute force attack , because of this issue had leads to the development of 3des
3DES – its also knows triple data encryption algorithm or TDES, it will encrypt the packet three time than DES algorithm, it was accepted by USA in 1999.
IDEA – International Data Encryption Algorithm, its also a symmetric Encryption algorithm and current one which approved and used in most the devices are AES
AES – Advanced Encryption Standard Algorithm ,its support 256 key bits ,still now this algorithm is never hacked, AES was designed to replace DES ,3DES and IDEAS type algorithm.
AES was approved by NIST in 1997 as the replacement for DES algorithm, is more secure than DES/3DES and its fast and efficient in both hardware and software
other type of symmetric algorithms are bluefish and two fish
Stay with us for more post on encryption technology…
welcome back friends, we are discussing the concept of cryptography and its continuation and we are looking on history of cryptography. Classical cryptography is used before computer era.
caser cipher or rotation cipher
Lets takes an example of rotate by 3 , a become d, b become e . “hai” the character will become “kdm” after rotation . receivers should know how to rotate it back.
Cipher disk normally has two concentric disks, each with an alphabet with the periphery, two parties has to agreed with the common character set, for example “s will set d” and the character will be encrypted ,below picture show the cipher disk with we can adjust the character with inner circle “a will set to c” the character will be rotated same like caser cipher.
lot other cryptographic devices are used, during the second world war period also for secure communication. some of the devices used are mentioned below .
In the next post we will see the cryptography concept in Computer era.
Data security is not full-filled without knowing cryptography concept, even if u can see in social networking software like whats app,viber you can see end to end encryption are all falls in cryptography only.
Now let us look what is cryptography, its a secret writing. Its a type of secure communication whose meaning is kept secret, crypto-analysis is the process of breaking secure communication and reading the secret message.
Below are the some of the definition,which we are going to use in cryptographic technique. Plain text is the term refer to readable message before applying cryptographic algorithm. chipper is the encrypted message after applying Cryptographic algorithm.
Encryption steps in cryptography :
Decryption Steps in cryptography :
A good encryption will contain a strong cryptographic, which cannot be easily break it, crypto graphic concept is not a new technology, its has be rooted back to old ages its concept is used during medieval period also. but the technology and algorithm is changed over period of time
It has been differentiated into two categories
We will look on deep into above two cryptography on upcoming posts
In our last two threads I mentioned how data are secured in Production Environment and in data stored state.
Think about voice/video communication all communication is made through IP packets only. Do you think its secured and it cannot have hacked by others?
We need all the data should be secured in either form of communication through data, voice or video mode.
Even accessing remote devices through command prompt or remote desktop are replaced by SSH access.
In corporate network, most secured form of transaction is done through Encrypted VPN connection either client access the network i.e. users is accessing from his own laptop. Or for site to site access.
Organizations often enable remote access solutions such as virtual private networks(VPNs). VPNs allow employees to access the organization’s internal network from them home or while traveling. VPN traffic goes over a public network, such as the Internet, so encryption is important. VPNs use encryption protocols such as TLS and Internet Protocol security (IPsec).
What is VPN? VPN stands for Virtual private network, connecting to private through a secured tunnel in public Environment (through worldwide internet), which is an unsecured. we need to understand what is tunnel for complete understanding of VPN connectivity.
What is tunneling? it’s a network communication process, it protects the content of the packet by encapsulating with another protocol. Encapsulation and encapsulation will be done by both the end, by using a VPN device. Normally this services will come along with all the firewall devices.
Common VPN protocols are PPTP, L2F, IPSEC VPN technology.
In my previous thread we discussed about , labelling of data’s and privileges to accessing of data in secured way.
Let us look on how the data’s are secured in the stored environment, below are the storage places where data’s are stored .
CD-Drive/Floppy disk now a days most of the peoples are stopped using this as data’s are moving in terabyte sizes now a days, so let us ignore this devices .
Devices like hard, flash drive can be protected by password mechanism, privilege level access to the storage devices are also provided ,like the Administrator can only able to access all area in the hard drive. End users was restricted to access it .
In USB type storage ,users are restricted with passwords . so high security devices can be accessed only through the required credentials.
A common and recommended form of protecting mechanism is through Encrypting the devices, You can see the encryption software in external hard drive by default , the data will get encrypted with the encryption only it will be decrypted with the same key .we will see deeper into encryption and decryption on my future threats.
How about the recovering of erased data ? yes it can be recovered using a recovering software and lot other technologies .
Data should be permanently deleted as the data should not disclosed to anyone. Below are the some common form of deleting data’s