'

How to Thwart Hackers and the NSA with Encryption

Понравилась презентация – покажи это...





Слайд 0


Слайд 1

DATA BREACHES are making headlines


Слайд 2

There were more data breaches in 2014 than any year on record


Слайд 3

The average cost of a data breach is now $3.8 MILLION


Слайд 4

AND SNOWDEN REVEALED GOVERNMENTS HAVE SWEEPING SURVEILLANCE POWERS


Слайд 5

Among them, the NSA: Taps fiber optic cables that carry much of the world’s Internet traffic Collects over 200 million text messages each day Intercepts unencrypted data sent between Google and Yahoo data centers


Слайд 6

YOUR DATA SHOULD BELONG TO THE NSA


Слайд 7

YOU YOU YOUR DATA SHOULD BELONG TO THE NSA


Слайд 8

Security experts agree is one of the best ways to protect your data


Слайд 9

“Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.” Edward Snowden


Слайд 10

Millions of people encrypt data on their computers, but what about when they use apps?


Слайд 11

EMAIL IS LIKE A POSTCARD Anyone who handles your email in transit can read it, including your ISP, a hacker, or the NSA


Слайд 12

Here are some secure alternatives CryptoCat Encrypted in transit? Encrypted so provider can’t read it? Can you verify contacts’ identities? Are past communications secure if keys stolen? Is code open to independent review? Is security design properly documented? Has code been audited? Source: Electronic Frontier Foundation, ProPublica, Joseph Bonneau Silent Text Silent Phone Signal/RedPhone ChatSecure + Orbot


Слайд 13

And when you browse the Internet, people can see the unencrypted data sent to and from a website


Слайд 14

JUST 1.9% of the Internet’s top 1 million sites use HTTPS encryption by default


Слайд 15

Browser plugins like HTTPS Everywhere Browser plugins like HTTPS Everywhere can switch to can switch to encryptionandthwart criminals to cyber encryption to thwart surveillance surveillance and cyber criminals


Слайд 16

When it comes to the cloud, 11% of apps encrypt data stored at rest


Слайд 17

Some of the biggest names in cloud computing don’t store customer data encrypted


Слайд 18

TOP 10 MOST POPULAR APPS that don’t encrypt data 1. Facebook 6. Gmail 2. Twitter 7. eBay 3. YouTube 8. Paypal 4. TubeMogul 9. Hotmail 5. Linkedin 10. AOL Mail


Слайд 19

WHY DOES IT MATTER?


Слайд 20

When the government seized Megaupload’s servers, they seized all the data customers had uploaded to the service


Слайд 21

When hackers gained access to Slack’s core systems, they stole unencrypted usernames, email addresses, phone numbers, and Skype IDs


Слайд 22

When data is stored encrypted, it is not readable by any third parties who may gain access


Слайд 23

There are many encryption options There are many encryption options available today available today


Слайд 24

But there is usually a tradeoff between the strength of the Encryption Strength (approximate) encryption and maintaining cloud app functionality Regular (Unstructured) Encryption Selective Encryption Searchable Encryption Local Search Tokenization Searchable Encryption Keyword Extraction Searchable Encryption Word-By-Word Data Tokenization Format-Preserving Encryption (FPE) Order-Preserving Encryption (OPE) Search By Prefix Functionality Preserved (approximate)


Слайд 25

Download the Encryption Handbook The Cloud Encryption Handbook: ENCRYPTION SCHEMES AND THEIR RELA TIVE STRENGTHS AND WEAKNESSES Learn more about encryption schemes and their relative strengths and weaknesses. (Report Cover) DOWNLOAD NOW Alexandra Boldyreva , Ph.D. Computer Science, M.S., B.S. Applied Mathematics Paul Grubbs, B.S., Mathematics, Computer Science Brought to you by


Слайд 26


×

HTML:





Ссылка: