secure and green

10

Click here to load reader

Upload: budi-rahardjo

Post on 26-Jan-2015

104 views

Category:

Technology


0 download

DESCRIPTION

Presentation at Green ICT

TRANSCRIPT

Page 1: Secure And Green

Secure and GreenBudi [email protected]

Page 2: Secure And Green

BR - Secure and Green 2

Security

GoalsConfidentiality

Integrity

Availability

How toEncryption

Message Authentication Code, hash function

Redundancy2010

Page 3: Secure And Green

BR - Secure and Green 3

Encryption for Confidentiality

Must deliver encrypted data as soon as possible

Current encryption algorithms (RSA, ECC) are computationally expensiveUses more energy! Not so green

2010

Page 4: Secure And Green

BR - Secure and Green 4

More on encryption

Must be difficult to break (eg. via brute force attack)

“Easier” to use (calculate), but it is still expensive in terms of computational resource usage

Thus, high performance computing

2010

Page 5: Secure And Green

BR - Secure and Green 5

Green Encryption

Must find algorithm that requires less computation to use (but still difficult to attack)

Reuse available blocks

2010

Page 6: Secure And Green

BR - Secure and Green 6

Integrity

Message Authentication Code (MAC) ensures that one bit change in data produces (significantly) different signature

Implemented with hash function

Hash function (relatively) computationally inexpensive

Maybe green?2010

Page 7: Secure And Green

BR - Secure and Green 7

Availability

Implemented through redundancy not so green

Alternative solutionShared backup / redundant servers

through virtualization?

2010

Page 8: Secure And Green

BR - Secure and Green 8

Virtual Servers

Virtualization, virtual servers, combining several applications into one physical server

Use less physical resources, thus green

But, … it is more difficult to manage in terms of security

[how about cloud computing?]2010

Page 9: Secure And Green

BR - Secure and Green 9

Incident Handling

How to make more greenCentralized unified threat

management (use less servers for logging and analysis)

Remote forensicThings that can be done remotelyAt the last step, bring forensic team

(if needed)

2010

Page 10: Secure And Green

BR - Secure and Green 10

Final Remarks

Still difficult to achieve secure and green

2010