secure and green
Post on 26-Jan-2015
104 Views
Preview:
DESCRIPTION
TRANSCRIPT
Secure and GreenBudi Rahardjobudi@indocisc.com
BR - Secure and Green 2
Security
GoalsConfidentiality
Integrity
Availability
How toEncryption
Message Authentication Code, hash function
Redundancy2010
BR - Secure and Green 3
Encryption for Confidentiality
Must deliver encrypted data as soon as possible
Current encryption algorithms (RSA, ECC) are computationally expensiveUses more energy! Not so green
2010
BR - Secure and Green 4
More on encryption
Must be difficult to break (eg. via brute force attack)
“Easier” to use (calculate), but it is still expensive in terms of computational resource usage
Thus, high performance computing
2010
BR - Secure and Green 5
Green Encryption
Must find algorithm that requires less computation to use (but still difficult to attack)
Reuse available blocks
2010
BR - Secure and Green 6
Integrity
Message Authentication Code (MAC) ensures that one bit change in data produces (significantly) different signature
Implemented with hash function
Hash function (relatively) computationally inexpensive
Maybe green?2010
BR - Secure and Green 7
Availability
Implemented through redundancy not so green
Alternative solutionShared backup / redundant servers
through virtualization?
2010
BR - Secure and Green 8
Virtual Servers
Virtualization, virtual servers, combining several applications into one physical server
Use less physical resources, thus green
But, … it is more difficult to manage in terms of security
[how about cloud computing?]2010
BR - Secure and Green 9
Incident Handling
How to make more greenCentralized unified threat
management (use less servers for logging and analysis)
Remote forensicThings that can be done remotelyAt the last step, bring forensic team
(if needed)
2010
BR - Secure and Green 10
Final Remarks
Still difficult to achieve secure and green
2010
top related