how to thwart hackers and the nsa with encryption

26

Upload: skyhigh-networks-cloud-security-software

Post on 04-Aug-2015

35.884 views

Category:

Technology


6 download

TRANSCRIPT

Page 1: How to Thwart Hackers and the NSA with Encryption
Page 2: How to Thwart Hackers and the NSA with Encryption

DATA BREACHES are making headlines

Page 3: How to Thwart Hackers and the NSA with Encryption

There were more data breaches in 2014 than any year on record

Page 4: How to Thwart Hackers and the NSA with Encryption

The average cost of a data breach is now

$3.8 MILLION

Page 5: How to Thwart Hackers and the NSA with Encryption

AND SNOWDEN REVEALED GOVERNMENTS HAVE SWEEPING SURVEILLANCE POWERS

Page 6: How to Thwart Hackers and the NSA with Encryption

Among them, the NSA:

Taps fiber optic cables that carry much of the world’s

Internet traffic

Collects over 200million text messages

each day

Intercepts unencrypted data sent between Google

and Yahoo data centers

Page 7: How to Thwart Hackers and the NSA with Encryption

YOUR DATA SHOULD BELONG TO THE NSAYOUR DATA SHOULD BELONG TO THE NSA

Page 8: How to Thwart Hackers and the NSA with Encryption

YOUR DATA SHOULD BELONG TO THE NSA

YOUYOUR DATA SHOULD BELONG TO THE NSA

YOU

Page 9: How to Thwart Hackers and the NSA with Encryption

Security experts agree

is one of the best ways to protect your data

Page 10: How to Thwart Hackers and the NSA with Encryption

Edward Snowden

“Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.”

Page 11: How to Thwart Hackers and the NSA with Encryption

Millions of people encrypt data on their computers,

but what about when they use apps?

Page 12: How to Thwart Hackers and the NSA with Encryption

EMAIL IS LIKE A POSTCARD

Anyone who handles

your email in transit can

read it, including your

ISP, a hacker, or the NSA

Page 13: How to Thwart Hackers and the NSA with Encryption

Here are some secure alternatives

Encrypted so provider can’t read it?

Encrypted in transit?

CryptoCat Silent Text Silent Phone Signal/RedPhone ChatSecure + Orbot

Can you verify contacts’ identities?

Are past communicationssecure if keys stolen?

Is code open to independent review?

Is security designproperly documented?

Has code been audited?

Here are some secure alternatives

Source: Electronic Frontier Foundation, ProPublica, Joseph Bonneau

Page 14: How to Thwart Hackers and the NSA with Encryption

And when you browse the Internet,people can see the unencrypted data sent to and from a website

Page 15: How to Thwart Hackers and the NSA with Encryption

JUST 1.9% of the Internet’s top 1 million sites use HTTPS encryption by default

Page 16: How to Thwart Hackers and the NSA with Encryption

Browser plugins like HTTPS Everywhere can switch to encryption to thwart

surveillance and cyber criminals

Browser plugins like HTTPS Everywhere can switch to encryption to thwart surveillance and cyber criminals

Page 17: How to Thwart Hackers and the NSA with Encryption

When it comes to the cloud,

of apps encrypt data stored at rest 11%

Page 18: How to Thwart Hackers and the NSA with Encryption

Some of the biggest names in cloud computing don’t store customer data encrypted

Page 19: How to Thwart Hackers and the NSA with Encryption

1. Facebook

2. Twitter

3. YouTube

5. Linkedin

6. Gmail

7. eBay

8. Paypal

4. TubeMogul

10. AOL Mail

9. Hotmail

TOP 10MOST POPULAR

APPSthat don’t encrypt data

Page 20: How to Thwart Hackers and the NSA with Encryption

WHY DOES IT MATTER?

Page 21: How to Thwart Hackers and the NSA with Encryption

When the government seized Megaupload’s servers, they seized all the data customers had uploaded to the service

Page 22: How to Thwart Hackers and the NSA with Encryption

When hackers gained access to Slack’s core systems, they stole unencrypted usernames, email addresses, phone numbers, and Skype IDs

Page 23: How to Thwart Hackers and the NSA with Encryption

When data is stored encrypted, it is

by any third parties who may gain accessnot readable

Page 24: How to Thwart Hackers and the NSA with Encryption

There are many encryption options available today

There are many encryption options available today

Page 25: How to Thwart Hackers and the NSA with Encryption

But there is usually a tradeoff between the strength of the encryption and maintaining cloud app functionality

Functionality Preserved (approximate)

En

cryp

tio

n S

tre

ng

th (

ap

pro

xim

ate

)

Regular (Unstructured) Encryption

Selective Encryption

Searchable Encryption - Keyword Extraction

Searchable Encryption - Local Search Tokenization

Searchable Encryption - Word-By-Word

Data Tokenization

Format-Preserving Encryption (FPE)

Order-Preserving Encryption (OPE)

Search By Prefix

Page 26: How to Thwart Hackers and the NSA with Encryption

Download the Encryption Handbook

DOWNLOAD NOW

(Report Cover)

Learn more about encryption schemes and their relative strengths and weaknesses.

Brought to you by

The Cloud Encryption Handbook:

Alexandra Boldyreva , Ph.D. Computer Science, M.S., B.S. Applied Mathematics

Paul Grubbs, B.S., Mathematics, Computer Science

ENCRYPTION SCHEMES AND THEIR RELATIVE STRENGTHS ANDWEAKNESSES