secure and green
DESCRIPTION
Presentation at Green ICTTRANSCRIPT
![Page 1: Secure And Green](https://reader038.vdocuments.us/reader038/viewer/2022100506/54c5e2ea4a7959b4458b457a/html5/thumbnails/1.jpg)
Secure and GreenBudi [email protected]
![Page 2: Secure And Green](https://reader038.vdocuments.us/reader038/viewer/2022100506/54c5e2ea4a7959b4458b457a/html5/thumbnails/2.jpg)
BR - Secure and Green 2
Security
GoalsConfidentiality
Integrity
Availability
How toEncryption
Message Authentication Code, hash function
Redundancy2010
![Page 3: Secure And Green](https://reader038.vdocuments.us/reader038/viewer/2022100506/54c5e2ea4a7959b4458b457a/html5/thumbnails/3.jpg)
BR - Secure and Green 3
Encryption for Confidentiality
Must deliver encrypted data as soon as possible
Current encryption algorithms (RSA, ECC) are computationally expensiveUses more energy! Not so green
2010
![Page 4: Secure And Green](https://reader038.vdocuments.us/reader038/viewer/2022100506/54c5e2ea4a7959b4458b457a/html5/thumbnails/4.jpg)
BR - Secure and Green 4
More on encryption
Must be difficult to break (eg. via brute force attack)
“Easier” to use (calculate), but it is still expensive in terms of computational resource usage
Thus, high performance computing
2010
![Page 5: Secure And Green](https://reader038.vdocuments.us/reader038/viewer/2022100506/54c5e2ea4a7959b4458b457a/html5/thumbnails/5.jpg)
BR - Secure and Green 5
Green Encryption
Must find algorithm that requires less computation to use (but still difficult to attack)
Reuse available blocks
2010
![Page 6: Secure And Green](https://reader038.vdocuments.us/reader038/viewer/2022100506/54c5e2ea4a7959b4458b457a/html5/thumbnails/6.jpg)
BR - Secure and Green 6
Integrity
Message Authentication Code (MAC) ensures that one bit change in data produces (significantly) different signature
Implemented with hash function
Hash function (relatively) computationally inexpensive
Maybe green?2010
![Page 7: Secure And Green](https://reader038.vdocuments.us/reader038/viewer/2022100506/54c5e2ea4a7959b4458b457a/html5/thumbnails/7.jpg)
BR - Secure and Green 7
Availability
Implemented through redundancy not so green
Alternative solutionShared backup / redundant servers
through virtualization?
2010
![Page 8: Secure And Green](https://reader038.vdocuments.us/reader038/viewer/2022100506/54c5e2ea4a7959b4458b457a/html5/thumbnails/8.jpg)
BR - Secure and Green 8
Virtual Servers
Virtualization, virtual servers, combining several applications into one physical server
Use less physical resources, thus green
But, … it is more difficult to manage in terms of security
[how about cloud computing?]2010
![Page 9: Secure And Green](https://reader038.vdocuments.us/reader038/viewer/2022100506/54c5e2ea4a7959b4458b457a/html5/thumbnails/9.jpg)
BR - Secure and Green 9
Incident Handling
How to make more greenCentralized unified threat
management (use less servers for logging and analysis)
Remote forensicThings that can be done remotelyAt the last step, bring forensic team
(if needed)
2010
![Page 10: Secure And Green](https://reader038.vdocuments.us/reader038/viewer/2022100506/54c5e2ea4a7959b4458b457a/html5/thumbnails/10.jpg)
BR - Secure and Green 10
Final Remarks
Still difficult to achieve secure and green
2010