Page 1,908«..1020..1,9071,9081,9091,910..1,9201,930..»

MOL Joins Research JV Using Aerospace Engineering to Reduce Emissions – The Maritime Executive

MOL is looking to improve its ship's performance using aerospace engineering technologies

PublishedAug 4, 2022 6:42 PM by The Maritime Executive

Mitsui O.S.K. Lines, which has already been actively pursuing wind-assisted propulsion and fluid dynamics for improved performance, will now join a joint research effort for the application of aerospace engineering technologies to improve the performance of wind-powered vessels. One of Japans leading shipping companies, MOL is proactively working to use technological developments to reduce GHG emissions from its vessels and achieve group-wide net zero emissions by 2050.

MOL working with MOL Tech-Trade and Akishima Laboratories is working on joint studies related to wind-powered propulsion and is developing a new ship design, ISHIN, which reduces greenhouse gas (GHG) emissions by using wind as a propulsive force. Now they will implement more advanced joint development aimed at optimizing the hull shape for wind-powered vessels, which adopts aerospace engineering technologies in the ISHIN ship design, in collaboration with Dr. Kota Fukuda, Associate Professor at the Department of Aeronautics and Astronautics, Tokai University, Japan.

In the ISHIN ship design, the hull features a shape that reduces wind pressure from both the bow and the sides. It uses lift from diagonally opposite winds, in addition to ensuring a smooth, streamlined flow of wind to increase operating efficiency. Earlier this year, MOL ordered two 15,600 gross ton ferries that will be fueled by LNG and use the innovative hull design. MOL expects that the new ferries will reduce CO2 emissions by about 35 percent in comparison with ferries currently in service, by adopting the latest technologies.

Dr. Kota Fukuda, a noted researcher in fluid mechanics, aerodynamics, and flow simulation fields, and his group have carried out fluid dynamics research on the examination of flow phenomena around rockets and aircraft. They have also worked on the development of high-performance solar cars and solar unmanned airplanes, as well as other applications of their simulation technology. In this new project, they will expand their research field to ship engineering and ocean-going vessel development.

This new joint research project is launching as MOL also continues to push forward with its efforts to demonstrate its rigid wind sail for bulkers. The company is working with the Oshima Shipyard on the Wind Challenger, a retractable rigid sail. The shipyard recently floated out the first bulker with the Wind Challenger installed and MOL expects to start demonstrations of the vessel later this year. MOL has announced partnerships to build several bulkers outfitted with wind-assisted propulsion. The company also recently said it would study combining its rigid sails along with the installation of wind rotors on a bulker.

More:

MOL Joins Research JV Using Aerospace Engineering to Reduce Emissions - The Maritime Executive

Read More..

Dear Evil Engineer: Could I launch satellites, and a new career, with the help of a space cannon? – E&T Magazine

Is launching satellites (via a space cannon) a promising path to a lucrative Nasa contract and invitation to the Met Gala?

Dear Evil Engineer,

Having spent 15 years working my way into the petty ranks of the millionaires with my dodgy data analytics company, I am keen to move on to the next stage in my career. I aspire to become a fashionable oligarch making a splash in the commercial space sector, which is where all the other oligarchs seem to be having the most fun.Im interested in providing an alternative to commercial rocket launch services: to launch satellites into orbit using a cannon large enough to double up as an execution device. Is this a promising path to a lucrative Nasa contract and invitation to the Met Gala?Yours,

An entrepreneurial villain

Dear villain,

If you can offer a convincing alternative to rocket launches for propelling satellites into orbit and beyond, you may well have it made in the commercial space sector. Rockets are expensive (with launches to low Earth orbit costing at least $2,000/kg), polluting, and more prone to exploding than is typically considered ideal for multimillion-dollar vehicles. Their sheer cost means that there is already a lot of interest in replacing or even just assisting rocket launches with alternatives. This is probably necessary to reduce launch costs enough to make feasible large-scale space projects which remain limited to the realm of science fiction (such as space-based geoengineering, space-based solar power, and establishment of space colonies).

Space cannons are perhaps the most feasible alternative to rockets. They use explosives and enormous cannon-like structures to launch objects into space, either with a view to entering orbit (requiring speeds of at least 7,800m/s) or to escape Earths gravitational pull and travel to other parts of the Solar System (requiring speeds of at least 11,200m/s).

The concept goes back at least as far as Newtons Principia Mathematica. The idea was detailed in Jules Vernes 1865 novel From the Earth to the Moon, which described a 274m-long cannon capable of launching crewed lunar missions. In 1926, early space pioneers Max Valier and Hermann Oberth designed a cannon for firing tungsten steel projectiles to the Moon. This concept involved a 900m-long barrel containing a near-vacuum, built into a mountain with its muzzle near the top of Earths atmosphere to minimise drag losses.

It was not until the latter half of the 20th century that practical attempts were made at a space cannon. The first major project was Project HARP, supported by the US and Canadian departments of defence and led by real-life evil engineer Gerald Bull. In 1966, the HARP gun launched an 84kg projectile briefly into space, reaching a record altitude of around 180km. After Project HARP was cancelled, Bull continued to work on the concept for, er, Saddam Husseins regime, until his assassination in 1990. The work of Project HARP was continued through the 1990s and early 2000s with Project SHARP (Super HARP) at the Lawrence Livermore National Laboratory in California, which produced the worlds largest gas cannon.

With the growth of the commercial space sector in recent years, the idea of space cannons as alternatives to rockets has seen renewed interest. For instance, Project SHARP alum John Hunter is COO of Green Launch, which aims to cut the cost of orbital launches by a factor of 10 with a gas-based space cannon. The company hopes the service may be preferable to rocket launches for risk-averse companies launching satellite constellations; a single failed rocket launch can destroy hundreds of satellites at once. Green Launch has built a proof-of-concept cannon and hopes to reach the Krmn Line later this year.

There are many alternatives to rocket launches other than employing explosives in imitation of a traditional cannon. Other approaches could involve ram accelerators or electromagnetic acceleration; start-up StarTram hopes to make the latter a reality. Meanwhile, SpinLaunch is due to launch a Nasa payload later this year using a fascinating mechanical system with a spinning arm and huge vacuum chamber.

It is worth asking why a space cannon has never successfully put a satellite into orbit after all these decades of hard work. Well, it is undoubtedly a challenge to build a cannon large and powerful enough to kick a projectile into orbit, but there is no one insurmountable problem that has prevented this approach competing with rocket launches.

This is not to say that there are not major shortcomings to this approach; there are. For one, while rockets accelerate their payloads gradually, a space cannon causes accelerations so extreme as to crush conventional satellites (certainly beyond what a crew could endure). This could be lessened by building a longer barrel, but, even with a 60km barrel extending through Earths crust and troposphere, an acceleration beyond 500m/s2 would be required to reach orbital velocity. Entering the atmosphere at extreme speed, the payload would then suffer severe aerodynamic heating. Space cannon launches, then, are inherently unsuitable for all but the most rugged payloads.

The other major complication is that a space cannon alone cannot launch a payload into orbit; an uncorrected projectile will strike Earths surface before it can complete a full orbit, unless it reaches escape velocity. So, the payload will require some help to be nudged into a stable orbit, most likely from a small rocket.

These problems are non-trivial, but rocket launches as they are today are far from perfect, so the opportunity to innovate is there. I would advise you to approach this venture with certain expectations, such as about the limitations on the types of payloads you could offer to launch without destroying them. It may be that the most successful space cannon service is one which complements rather than replaces rocket launches. At any rate, space cannons are having another moment, so it seems a sensible path to becoming the sort of space-hobbyist oligarch who gets invited to the Met Gala.

Yours,

The Evil Engineer

Sign up to the E&T News e-mail to get great stories like this delivered to your inbox every day.

See the rest here:

Dear Evil Engineer: Could I launch satellites, and a new career, with the help of a space cannon? - E&T Magazine

Read More..

The Right Choice | To choose BSc Agriculture or BTech (Agriculture Engineering)? Expert provides overview – The Indian Express

(The Right Choice is a series by The Indian Express that addresses common questions, misconceptions, and doubts surrounding undergraduate admissions. You can read the stories here.)

Agriculture is a major contributor to the national economy in India, creating a demand for professionals with sound technical skills in the field. However, there is a general lack of awareness about the growth and future prospects of the courses in the area. .

Here is a look at two popular courses in the agricultural arena Bachelor of Science (BSc) Agriculture and Bachelor of Technology (BTech) Agriculture Engineering.

Course structure

BSc in Agriculture is a three-year undergraduate degree that is aimed at introducing students to the foundational concepts of agricultural science. It is an ideal option for a student interested in learning the fundamentals of agriculture.

Highlighting the structure of the programme, Deputy Dean at the School of Agriculture at Lovely Professional University, Chandra Mohan Mehta, said, The programme aids students in becoming familiar with farming practices. The training received in the course will help them think about how to raise productivity and improve agricultural quality in a sustainable manner. They are taught how to farm using environmentally friendly and bio-safe practices.

BTech (Agriculture Engineering), on the other hand, is a four-year engineering programme, which teaches students the methodology to use technology and automation in agriculture and food production.

In this course, everything revolves around how technology is used in agriculture. Society needs a technology-driven agricultural process to suit the needs of all living things. This is the reason that B.Tech in Agriculture programmes are available in all Indian agricultural schools and universities, Mehta said.

Higher education scope

Candidates who successfully complete BSc. Agriculture can opt to do an agri-business management course, a specialised Master of Science (MSc) degree in agriculture, or an MBA. They are also qualified to hold professional positions in public and private institutions.

The Agriculture Engineering BTech can help students secure jobs at National Seed Corporation, Food Corporation of India, the various state farm corporations, Indian Space Research Organization (ISRO), among others. Additionally, they can opt to take the Graduate Aptitude Test in Engineering (GATE) for admission to graduate programmes.

Although there are many possibilities for further education, a BSc in Agriculture is a preferable option if the individuals are more interested in research as opposed to technical fields, Mehta said.

India has some of the finest private and government agricultural colleges. BTech in Agriculture is offered at Indira Gandhi Agricultural University in Raipur, the Agriculture University in Jodhpur, ITM University Gwalior among others. BSc Agriculture is offered at the Lovely Professional University in Jalandhar, the Swami Keshwanand Rajasthan Agricultural University in Bikaner, and the Indian Agricultural Research Institute in New Delhi, among others.

Job prospects

Mehta said the BTech in Agricultural Engineering has an edge over BSc. Agriculture in terms of employment options and compensation.

About Rs 3 lakh is offered as the average compensation package for these graduates annually. However, the average compensation package for BTech graduates in Agricultural Engineering might reach Rs 7 lakh per year. One of the reasons for this huge difference is the current need for modern techniques of agricultural farming. Tech graduates are paid more than their counterparts, Mehta explained.

Visit link:

The Right Choice | To choose BSc Agriculture or BTech (Agriculture Engineering)? Expert provides overview - The Indian Express

Read More..

Ex-director of engineering firm charged with graft, abetting falsification of invoices for $552000 – The Straits Times

SINGAPORE - A former director of an engineering firm was on Friday (Aug 5) charged with graft and instigating an employee from another firm to falsify invoices seeking payment of more than $552,000.

Yap Tin Foo, 58, a former director of Starburst Engineering, was handed nine charges in total, including one for graft and eight for abetting the falsification of accounts.

He is accused of giving $9,934 in bribes in 2011 to Tan Keng Liong, vice-president of general contractor Jurong Primewide, in exchange for the contractor advancing the business interest of Starburst Engineering.

Yap is also said to have incited an employee of G-Cube Engineering to falsify invoices on eight occasions between September 2014 and August 2015, seeking payments that totalled more than $552,000.

Court documents did not state who or which company would benefit from the payments.

Another former director of Starburst Engineering, Edward Lim Chin Wah, 65, was also hauled to court on Friday to face three charges of instigating one of his employees to falsify subcontracts with G-Cube Engineering.

The alleged offences, which were committed between July and December 2014, involved subcontracts valued at $500,750.

Two other individuals were handed charges on Friday for alleged offences linked to Yap.

Tan, 64, faces two graft charges relating to receiving bribes worth around $14,700 from Yap between 2011 and 2012.

Gerald Lim Lee Meng, 56, vice-president of consultancy firm CPG Consultants, faces a charge under the Official Secrets Act for sharing with Yap an analysis of tender bids for projects the company had with the Ministry of Home Affairs. This is said to have happened in 2019.

All four are expected to return to court between Aug 26 and Sept 2.

If convicted under the Prevention of Corruption Act, an offender can be fined up to $100,000 and jailed for up to five years for each offence.

The maximum penalty for abetting the falsification of accounts is a 10-year jail term and a fine.

Those convicted under the Official Secrets Act can be fined up to $2,000 and jailed for up to two years.

Originally posted here:

Ex-director of engineering firm charged with graft, abetting falsification of invoices for $552000 - The Straits Times

Read More..

Bail Conditions For Arrested Australian Activists Demand The Impossible: No Using Encrypted Applications – Techdirt

from the encryption-in-the-land-down-under dept

The Australian government doesnt care much for encryption. It has, for years, tried to legislate encryption out of the picture. A law passed in 2018 gives the government the power to compel encryption-breaking efforts from tech companies.

The law survived a cursory review by the Parliamentary Joint Committee. Its 2021 report said the law was completely legal. And, even though it found oversight of the new encryption-breaking powers was inadequate, the law was a good thing for the government. Very little was said about the people affected by the law or the tech companies being forced to make their offerings less secure in Australia.

As Australian law enforcement sees it, the only people who actually need encrypted services and devices are criminals. And thats why suspected criminals (who have only been accused of crimes at this point) are being forced to give up their access to encrypted services, as Ariel Bogle reports for ABC (the Australian one) News.

Since late June, Greg Rolles must produceon demandhis computer and mobile phone for police inspection, and tell themhis passwords.

He is not allowed to use any encrypted messaging apps, like Signal or WhatsApp. He can only have one mobile phone.

And there is a list of 38 people, many of whom are his friends, who hes not allowed to associate with in any way even, another activistfound, liking a post on social media.

Rolles is allegedly a member of activist group Blockade Australia. The group has been known to engage in highly disruptive protests. Those often involve immobilizing vehicles and equipment. And there have allegedly been incidents where police officers (or at least the vehicles theyre in) have been attacked.

Thanks to a new anti-protest law, the government is able to treat even more innocuous protests in a heavy-handed manner. As this post detailing Blockade and its interaction with the new law notes, some members are being hit with 10-year prison sentences. Others have been arrested for vague violations like planning to block traffic.

The bail conditions are equally heavy-handed. As noted above, arrested Blockade members have been forbidden from using encrypted messaging apps or associating with each other. One member found themselves in violation of their bail conditions simply for sending a thumbs up emoji in response to a Facebook post by another member. (Bail violation charges were ultimately dropped for this action, but it still involved the person being accosted by police, detained, and booked.)

The restrictions imposed on Rolle have cut him off from the Afghanistan residents his church was providing assistance to. They communicated via WhatsApp, which is no longer an option for Rolle.

But its not just WhatsApp and Signal. Plenty of apps (and internet services) utilize encryption. And the bail terms are vague enough it could prevent Rolle and others like him from living somewhat normal lives while out on bail.

Large swathes of the internet are encrypted, which simply means that informationis converted into code to protect it from unwanted access. Apps from online banking to streaming servicesare typically encrypted.

Encryption is everywhere because its a fundamental part of keeping modern communications technology secure and functional, a spokesperson forElectronic Frontiers Australia said.

[That includes] essentially any modern device, including laptops, mobile phones, ATMs, TVs, PlayStations, and government websites such as myGov, Medicare, and Centrelink.

The bail conditions forbid arrestees (who are only accused of crimes at this point) from possessing an encrypted application/media application. That covers a lot of ground, especially since so many sites providing services from banking to streaming to news delivery prefer to route users through proprietary apps apps that generally utilize encryption in one form or another.

Even those who feel the courts hearts are in the right place attempting to prevent the planning of future protests that may be disruptive and/or turn violent feel these conditions go too far. The head attorney at the Shopfront Youth Legal Centre (Jane Sanders) stated this imposed a possibly unlawful restriction on the rights of people whove only been accused of criminal activity.

To effectively shut down the right to political communication with these conditions, it seems extreme to me, Ms Sanders said.

Well, as they say, the extremity is the point. The government has already deemed encryption to a tool of criminals and terrorists. The passage of a law increasing punishments for protest-related activity was meant to deter dissent. These new bail conditions drive it home: speak up against the government and/or its favored corporations and you can expect to have your life derailed, your communications severely restricted, and your freedom while bailed eliminated at a moments notice.

Filed Under: australia, bail, bail conditions, blockade australia, encryption, greg rolles, protests

Read more:
Bail Conditions For Arrested Australian Activists Demand The Impossible: No Using Encrypted Applications - Techdirt

Read More..

What are the top 5 Amazon S3 storage security best practices? – TechTarget

Storage security is a major concern for IT. Cloud storage -- specifically Amazon S3 -- can be particularly vulnerable if administrators aren't careful.

These five Amazon S3 storage security best practices -- including bucket settings and encryption -- stand out as the most important steps for admins.

The most common S3 storage security mistake organizations make is accidentally granting public access to buckets.

Access to S3 buckets is granted through an access control list (ACL). It is easy to accidentally configure these ACLs to enable public access. Fortunately, Amazon offers four settings to block public access:

Admins can apply these settings to individual buckets, access points, an AWS account or any combination of the three. If admins decide to block all public access to S3 buckets, Amazon recommends enabling all four settings by setting them to True.

Identity and Access Management (IAM) controls S3 storage access. In general, adhere to least privilege access principles. Give users the bare minimum permissions that they need to do their jobs.

Amazon recommends that admins separate read, write and delete access into individual IAM roles. This S3 security process makes it easier to grant write or delete access solely to the users who require it, instead of giving all users full access.

As with any storage system, encrypt any data in S3. Two options are available to encrypt data: client-side and server-side encryption.

Server-side encryption is the simpler of the two options and encrypts data as it is written to AWS storage. Admins can base server-side encryption on an Amazon-managed key, a customer master key or a customer-provided key.

Client-side encryption is more difficult to implement but is the better S3 storage security choice for admins concerned about decrypted data. Client-side encryption encrypts the data before it is sent to AWS. The encryption keys are maintained outside of the Amazon cloud. This approach guarantees that Amazon cannot decrypt user data but also means that admins must be careful not to lose the encryption key.

Require multi-factor authentication (MFA) for anyone who accesses data stored in AWS. MFA prevents anyone from accessing data using stolen account credentials.

An additional form of authentication is necessary beyond just a username and password. Amazon supports three MFA mechanisms -- a virtual MFA device, a Fast ID Online security key or a hardware device that generates a six-digit, time-synchronized code.

Enable server access logging, which tracks S3 access requests. That way, admins can see who accessed S3 buckets and when.

Logging also helps admins to know if unauthorized users attempt to gain access to storage resources.

Read the original post:
What are the top 5 Amazon S3 storage security best practices? - TechTarget

Read More..

The dangers of the UKs illogical war on encryption – ComputerWeekly.com

In a 21st century war, what happens online impacts events on the ground. Reliable, secure communication channels in Ukraine have delivered crucial information from President Zelenskyy directly to the people, and allowed him to broadcast appeals to the world and recruit international support.

Secure communication has empowered Ukrainians to combat disinformation, organise relief efforts, and protect evacuees. It has undoubtedly saved lives and guided Ukrainians to safety.

As Western countries support the Ukrainians with defensive and humanitarian aid, they must also defend Ukrainian citizens ability to communicate safely.

In the UK parliament, Nadine Dorries, secretary of state for digital, culture, media and sport, recently noted: WhatsApp [a secure messaging app] has launched an end-to-end encryption service that the Ukrainian people can access to find out what is happening in their location on a minute-by-minute, real- time basis and where they can get emergency support and help.

When people have no option but to entrust their communication to third-party services, some of which may be actively hostile, end-to-end encryption provides the highest level of security, because only the sender and receiver have the key to the messages. Just imagine their plight if that encrypted service was designed to facilitate third-party access.

Astonishingly, even as the UK government praises end-to-end encryption abroad, it is undermining it at home. The Online Safety Bill, which continues to proceed through parliament after being mentioned in the Queens Speech, will target platforms that use end-to-end encryption by placing a duty of care on service providers within the scope of the draft bill to moderate illegal and harmful content on their platforms, with fines and penalties for those that fail to uphold this duty.

To comply, providers offering end-to-end encrypted services would be forced to weaken, bypass or even remove encryption, putting the security and privacy of their users at risk.

Then, imagine someone still in Ukraine is trying to contact family members who have made it to the UK. Or a UK citizen is working with the aid agencies on the ground. Is their messaging app allowed to have secure communication in Ukraine, but only compromised encryption or none at all in the UK? Its a recipe for chaos.

Encrypted communication needs to be secure, no matter where you are. We cannot let the UK be the weak link in that chain.

The same end-to-end encrypted services are critical for journalists, who depend on them to keep information channels open despite government censorship. When the BBCs Russian website was blocked, the broadcaster used encryption to circumvent some of the restrictions and continue publishing through alternative channels.

Supporters of the Online Safety Bill will doubtless point out that journalistic content is exempt, which is, frankly, irrelevant. Individual citizens should be able to send evidence of war crimes, confidentially and securely. The act of sending it should not put their own safety at risk; nor should platforms and intermediaries be reluctant to convey the evidence on the basis that it might be offensive or disturbing.

Its as if the government either hasnt considered the cross-border implications of its anti-encryption policy or isnt worried about the race to the bottom it would create.

At a time when Ukraine needs us to step up, the UK government is instead on the brink of undermining end-to-end encryption with the Online Safety Bill. We are seeing, under the most tragic circumstances, how dangerous it is when a countrys citizens cannot communicate securely and cannot access reliable information safely.

It may be true that, as the saying goes, the first casualty of war is the truth but thats no reason to help it die.

Robin Wilton is director of internet trust at the Internet Society

Here is the original post:
The dangers of the UKs illogical war on encryption - ComputerWeekly.com

Read More..

Backup Encryption: What It Is and Why Its Important for Data Security – Security Boulevard

What is backup encryption?

TechTarget defines encryption as the method by which information is converted into secret code that hides the informations true meaning. Backup encryption conceals the original meaning of the data, thereby preventing it from being known to or used by unauthorized personnel. Backup encryption helps maintain confidentiality and integrity of data by converting unencrypted data, also known as plaintext, to encrypted data or ciphertext. Backup encryption is a two-way function: first, it converts plain text into ciphertext or a secret code and then uses a key to interpret the secret code into plaintext. Once a backup is encrypted, anyone without the decryption key will not be able to read it.

An encrypted backup is a backup that is protected by encryption algorithms to maintain the authenticity, confidentiality and integrity of information as well as prevent unauthorized access. An unencrypted backup simply means data or information stored is not encoded by any algorithm. Encrypted backups are secured by complex algorithms and are readable to only those users with a key. An unencrypted backup is vulnerable to online breaches and cyberattacks, and since it is in an unsecured form or plaintext, the information can be easily viewed or accessed.

Cybercrimes are growing both in frequency and sophistication. Despite organizations implementing several security controls, threat actors still manage to penetrate defense systems and wreak havoc. According to The Global Risks Report 2022 by the World Economic Forum, cybersecurity infrastructure and/or measures taken by businesses, governments and individuals are being outstripped or rendered obsolete by increasingly sophisticated and frequent cybercrimes.

Backups are quickly becoming a hot target for cybercriminals because they want to get rid of your ability to recover and gain full control of the attack. Therefore, backup encryption is important not only for business continuity and disaster recovery but also to improve your organizations overall security posture. Backup encryption is a security best practice that helps protect your organizations confidential information and prevents unauthorized access. Most organizations today use encryption technology for securing their sensitive data. Encrypting backups adds an additional layer of security by converting sensitive information into an unreadable format. Even if threat actors manage to intercept the data while in transit, they will not be able to access or read it without the decryption key. Due to its high reliability, encryption is used for both commercial and military purposes.

It is important to back up your data for quick recovery from a data loss or cybersecurity incident. However, you must also ensure that your backups are protected by encrypting them. Backup encryption has several benefits, including:

Privacy: Encryption encodes your information, rendering it inaccessible to malicious third parties or untrusted users. It also gives you and your customers peace of mind knowing that sensitive information will not end up in the wrong hands.

Security: Encryption protects against identity theft and blackmail since hackers cannot access the information without a key. Backup encryption also makes data more resistant to tampering and corruption.

Data integrity: Encryption prevents misuse of information even if your laptop, hard drive or smartphone is hacked, lost or stolen. This ensures the content of your backups is reliable, accurate, valid and has not been altered.

Authentication: Encryption ensures only intended parties have access to the data.

Regulations: Encryption helps your business comply with regulatory requirements and standards like the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA) and the Payment Card Industry Data Security Standard (PCI DSS) that require businesses to encrypt customer personal information when it is stored at rest and when transmitted across public networks.

Encryption converts data (messages or files) from plaintext or normal text into ciphertext using complex mathematical algorithms and encryption keys to improve data security. This ensures only intended parties can read or access the data. Once the encoded data is transmitted to the recipient, a decryption key is used to translate the data back to its readable state.

A simple example of transforming readable text into ciphertext is by swapping each letter with the one that is next to the ordinary text in the alphabet. It simply means a is replaced with b, b with c and so on. Here is how the encryption would appear: the word confidential would be converted to dpogjefoujbm. When data is encrypted, intruders can see that information is exchanged or transmitted; however, they cannot unlock the data without the correct key. This ensures data security both while in transit and at rest. Only authorized personnel with the secret key can decode and read the information.

The efficacy of encryption depends on the encryption algorithm used, the length or number of bits in the decryption key (longer keys are often much harder to crack) and the encryption method employed.

There are several factors that need to be considered to effectively encrypt your data, including the state in which your data is in. This will ensure your valuable data is encrypted and protected at all times.

Encryption in transit: This means encrypting data while it is in motion between devices and networks or is being transferred to the cloud. Encryption in transit occurs between the backup source (a machine, server, Salesforce, Microsoft 365, Google Workspace, etc.) and the backup destination (Unitrends Cloud, Spanning-managed storage in S3, customer-managed storage, to name a few). It is like putting your data in an armored vehicle before being transported.

At Spanning, we use the respective app model and best practices for each SaaS provider in combination with OAuth2.0. This means all backups are transmitted securely, making it impossible for intruders to steal the data while its being backed up.

Encryption at rest: This means encryption of data once it resides on a storage at rest or the backup destination. In simple terms, encryption at rest is like keeping your valuable information in a vault and securing it with a PIN, password or key. In data encryption, a key is used to encrypt and decrypt data to prevent hackers from gaining access to data even if they have physical access to the device. This can be done with a Spanning-managed key hosted in Amazon Web Services (AWS) or a customer-provided key hosted in AWS. This also means that even if hackers manage to steal data from a backup solution provider, they still will not be able to do anything with it since they do not have the key.

Key management services like AWS Key Management Service (AWS KMS), Azure Key Vault, Google Cloud Key Management and others, allow easy management of cryptographic keys. Key management ensures the security of your keys and also provides an easy way to control and access your data.

With AWS KMS, you can easily create cryptographic keys to encrypt your data stored in the cloud and control the use of the keys across a wide range of AWS services. AWS KMS uses hardware security modules (HSM), and the keys are validated under the FIPS 140-2 Cryptographic Module Validation Program, making the service highly secure and resilient. The centralized key management system allows you to import, rotate, delete, manage permissions and define policies on keys.

Azure Key Vault allows you to securely store and access secrets API keys, passwords, certificates, cryptographic keys and so on. The cloud service enhances security and control over your cryptographic keys and other secrets using FIPS 140-2 Level 2 and Level 3-validated HSMs. Azure Key Vault allows you to easily create, import and define access policies to control access to your secrets.

A centralized key management system provides multiple benefits to businesses, including:

The Advanced Encryption Standard (AES), also known as Rijndael, is the most widely adopted and trusted symmetric encryption algorithm. In fact, AES encryption is the U.S. Government standard for encryption. AES is a cryptographic algorithm used to protect digital assets. AES was developed to replace the Data Encryption Standard (DES) algorithm after the National Institute of Standards and Technology (NIST) recognized that the DES was growing vulnerable with advancements in cryptanalysis.

AES supports three keys with 128-bit, 192-bit and 256-bit key lengths. AES 256-bit encryption is considered to provide the highest level of security. Due to its speed, resistance to attacks and compatibility, the U.S. Government and countless non-governmental organizations worldwide use AES encryption to protect their confidential data.

Bring Your Own Key (BYOK) is an encryption model that allows customers to use their own encryption software and keys to encrypt and decrypt data stored in the cloud. This gives you more control over your data and management of your keys. BYOK adds an additional layer of security to your confidential data. You can use the encryption software to encrypt data before sending it to your cloud service provider and decrypt is using your key upon retrieval.

Did you know that as of 2022, more than 60% of all corporate data is stored in the cloud?

Cloud offers multiple benefits, such as increased agility, scalability, productivity, reduced costs and so on. However, there are some critical security issues that you must be aware of, like data privacy and control, lack of visibility, programmatic errors and unauthorized access, to name a few. Your cloud service provider actually controls your backups stored in the cloud. Its no surprise data loss and leakage (69%) were the top cloud security concerns in 2021, followed by data privacy/confidentiality (64%). To address these issues, businesses like yours can leverage BYOK encryption, which allows you to encrypt data before transmitting it to the cloud, and the best part is, the key to your backups lies with you.

Spanning Backup for Google Workspace, Microsoft 365 and Salesforce offers Customer-Managed Encryption Keys or Bring Your Own Key, which gives you increased control over your companys data. Additionally, it allows you to control cloud service providers level of access to your data and enables you to suspend or shut off access at any time, thereby mitigating risks related to data security. Our encryption key self-management also provides data access transparency into how keys are used, as well as greater control via best practices in limiting key access.

Spanning protects your SaaS data with 256-bit AES object-level encryption, with unique, randomly generated encryption keys for every single object and a rotating master key protecting the unique keys. Additionally, Transport Layer Security (TLS) encryption is used to protect all data in transit.

Discover how Spanning provides end-to-end protection for your SaaS data.

Request a Demo Today

The rest is here:
Backup Encryption: What It Is and Why Its Important for Data Security - Security Boulevard

Read More..

Quantum computing will require massive software updates. Doing that securely will be its own challenge. – Protocol

No matter how long it takes to reach commercialization in the enterprise, quantum computing could have major consequences for the world of cybersecurity well in advance of the technology going mainstream.

To date, most of the security discussion around quantum computing has focused on the possible implications for data encryption. The most common scenario: Someday maybe in five, 10 or 20 years mega-powerful computing systems that harness the very weird properties of quantum mechanics could achieve the unthinkable, and obliterate the current methods of encryption that the internet depends on for security.

On the other hand, maybe this will never happen at all. No one can say for sure.

It's very clear, however, that the tech industry is gearing up for this so-called "post-quantum" scenario. Software will be updated on an epic scale to accommodate new methods of quantum-resistant cryptography that are being advanced by the government and researchers.

That means while nobody can be certain if quantum computing will ever really pose a security risk itself, the preparations surely will: It's inevitable that we'll see a large number of security vulnerabilities unintentionally introduced into software as the process plays out, said Jonathan Katz, a cryptography expert and IEEE member. Any time software is changed on a large scale particularly when its happening quickly vulnerabilities will tend to creep in.

"We know how to design mathematically secure algorithms," said Katz, whos also a professor of computer science at the University of Maryland. "We're not quite as good yet at implementing them in a secure way."

Thats a challenge the tech industry will have to figure out. If the hackers of, say, 2032 get their hands on a quantum computer that could break encryption, it would put much of the world's data at risk. (That includes, by the way, encrypted data that threat actors might be collecting today and storing away for a decrypting opportunity in the quantum future, according to experts.)

We can thank the efforts of cryptography specialists working in tandem with the National Institute of Standards and Technology for helping the industry prepare for this threat. Back in 2016, the agency helped get the ball rolling on post-quantum cryptography by launching a process for soliciting the algorithms needed to do the job.

In July, NIST presented the fruits of that six-year process, announcing four algorithms that the agency aims to use as the basis for the new quantum-resistant method of encryption. The algorithm that will provide secure web access is known as CRYSTALS-Kyber (some experts refer to it as Kyber). The three remaining algorithms will come into play for identity verification during digital exchanges.

While NIST says it expects to finalize the algorithm choices in "about two years," the vendors whose technology underpins the functions of the internet have already begun exploring how to implement them particularly Kyber.

Since there are a number of different ways to implement Kyber, the industry now has to settle on which type of implementation to embed into the TLS protocol, which is what enables HTTPS secure web browsing.

"The industry is now in the mode of, 'OK, we know what the algorithm is going to look like how do we actually deploy it into systems? And what are the troubles and pitfalls of that?'" said Nick Sullivan, head of research at web security and performance vendor Cloudflare.

Software developers, however, have had decades to figure out how to properly deploy existing forms of encryption, such as RSA. "That time has allowed people to learn from their mistakes," Katz said. "And many mistakes were made along the way."

Now, we may have the same situation occur again, with the implementation of largely untested new algorithms that are based on different techniques, he said. Rather than facing an underlying issue with the algorithms, he believes it's more probable we'll see a variety of flaws in the code introduced during the software engineering process.

We know how to design mathematically secure algorithms. We're not quite as good yet at implementing them in a secure way.

Buffer overflow issues a common bug in software code that can enable an attacker to access parts of memory they shouldn't be allowed to are among the types of vulnerabilities that are likely to pop up a lot in a situation such as this, Katz said.

How could this happen? For one thing, there will be a learning curve involved for software engineers.

To some degree, they "will need to understand what's going on under the hood," Katz said. The complexity of the algorithms could present bigger difficulties than understanding existing methods, however.

Meanwhile, as the saying goes, speed is the enemy of security. And there's going to be a lot of new software being written as part of these post-quantum preparations, and written quickly, Katz said.

All in all, the implementation of the new algorithms is sure to become a "significant source of vulnerabilities in the five years after these things are first widely deployed," he said.

For better or worse, the tech industry feels a lot of urgency around implementing the post-quantum algorithms. In part, that's because "nobody knows" when the threat to encryption might emerge, said Nelly Porter, Google Cloud's lead product manager for technology areas including encryption and quantum computing.

"Everybody assumes that it will take many, many years. But I think in the world of cryptography, we are much more paranoid," Porter said.

When is the earliest she thinks it could happen?

"I would say [as soon as] three years for very advanced adversaries to make it usable," Porter said. "We have time to get ready. But we don't have too much time."

Other experts have predicted longer time frames before the performance of quantum computers would be able to break encryption (specifically, whats known as asymmetric encryption, or public-key cryptography).

Chris Monroe, a quantum computing pioneer and Duke University physics professor, believes it will take 10 years or more to get there. In the meantime, early quantum computing applications for instance, optimization of delivery routes or financial models will likely be commercialized in a shorter time frame, said Monroe, who is also co-founder and chief scientist at quantum computing vendor IonQ.

However, it'll take longer for quantum computers to break encryption because the problem sizes are so big, he said. In other words, breaking encryption will probably not be the first thing that happens when it comes to real-world usage of quantum computers.

Once technology vendors have done their part to implement the quantum-resistant algorithms, that's when the work for businesses will begin. And that will probably be the hardest part of all, experts told Protocol.

Hardware, operating systems and software will all need updates to enable the new quantum-proof encryption methods.

"There's a big patching and replacement exercise that's going to go on here which is complicated, time-consuming and important," said Tim Callan, chief compliance officer at Sectigo, a major provider of digital certificates that are used in the encryption process.

We have time to get ready. But we don't have too much time.

The process will require taking an inventory of everything they use that leverages encryption. Thats no small task for any organization, but it will be especially daunting for those with workers, data centers and edge devices scattered around the globe.

"They're going to need to look at every system. And they're going to need to say, 'Is this system post-quantum-ready or not?'" Callan said. "'And if it is not, how do I feel about that?' They're going to have to prioritize."

Businesses that rely heavily on cloud infrastructure will have less to worry about, since a lot of the updates will happen behind the scenes, said Cloudflare's Sullivan. Those who still have a lot of physical machines in their operation will need to figure out if their devices can even be updated, or if they'll need to be replaced, he said.

One of the big questions for businesses will also be whether their existing PC fleets will be able to handle the compute requirements of the new algorithms.

While NIST included a requirement that the new algorithms would not be significantly more compute-intensive, that doesn't mean that every PC will be able to run them, said Stel Valavanis, founder and CEO of managed security provider onShore Security.

In the same way that the shift to work-from-home and videoconferencing forced many businesses to upgrade their PC fleets, the arrival of post-quantum encryption could be the "next ceiling" that businesses run into in terms of device performance, Valavanis said.

While it's still too early to know for sure, there's certainly a chance we could be heading into a "haves and have nots" scenario with quantum-resistant encryption, said Keith McCammon, co-founder and chief security officer at managed detection and response vendor Red Canary.

"We're probably going to run into questions of access: Is this thing equally accessible to everybody?" McCammon said.

On the other hand, there's also a chance that some businesses will not put a priority on quantum-proofing their systems at all.

Due to the uncertain and potentially long time frames and all of the more immediate threats that businesses are dealing with on a daily basis there's "always that risk" that some businesses will just ignore the issue, said Boaz Gelbord, chief security officer at Akamai Technologies.

In the short term, there might seem to be no consequences of inaction, said Joseph Steinberg, an independent information security consultant. But in all likelihood, we're never going to get much of an advanced warning about when encryption will be at risk, he said.

"The Chinese government doesn't announce what they're doing. We don't really know what the current capabilities are" for quantum computing, he said.

Ultimately, "we're talking about something catastrophic," Steinberg said. "And if we're wrong and this hits sooner than expected we have a problem."

Originally posted here:
Quantum computing will require massive software updates. Doing that securely will be its own challenge. - Protocol

Read More..

End-to-End Encryption Expands to Zoom Phone and Breakout Rooms – Tahawul Tech

Sending and sharing data is a sensitive matter, one that requires tailored innovation for adequate protection. Thats why Zooms released key features such as data routing control, in-product privacy notifications, end-to-end encryption (E2EE), and more to give customers more insight and control over their information.

And now, Zoom is excited to expand end-to-end encryption to both Zoom Phone and Breakout Rooms two more ways to use Zoom to achieve seamless and secure communication.

E2EE for Zoom Phone

Users will have a new option to upgrade to E2EE during one-on-one, intra-account phone calls that occur via the Zoom client. During a call, users can select More and see an option to elevate the session to an end-to-end encrypted phone call. The upgrade takes a second and helps add an extra layer of privacy to phone calls occurring over Zoom. Additionally, users will have the option to verify E2EE status by providing a unique security code to one another.

When enabled, end-to-end encryption uses the same Secure Real-time Transport Protocol (SRTP) with 256-bit AES-GCM encryption that supports standard Zoom Phone calls to encrypt call media between callers using Zoom desktop and mobile clients. The difference is that the cryptographic keys are known only to the devices of the callers.

To successfully elevate a Zoom Phone call to be end-to-end encrypted, users need to have a few things in place first:

E2EE for Breakout Rooms

Want to host an E2EE meeting, but hoping to break participants into groups for smaller, focused discussions? This is now possible as E2EE for Zoom Meetings has expanded to Breakout Rooms.

It will be the same experience as a standard E2EE meeting, except each breakout room gets its own unique meeting encryption key. Users can use this feature when they need to add an extra layer of security to important, private conversations, or just want to get certain people together during an E2EE meeting.

To learn how to enable E2EE for Zoom Meetings on your account, visit this support article.

Security without sacrifice

Whether its E2EE for Zoom Phone and Breakout Rooms, our account theft protection tool, or automatic updates Zoom is striving to make security accessible for everyone. These are just a handful of the easy-to-use tools that users can use to help safeguard your information while maintaining the flexible, reliable Zoom experience. Zooms frictionless, innovative design isnt mutually exclusive with a strong security posture in fact, theyre one and the same.

The rest is here:
End-to-End Encryption Expands to Zoom Phone and Breakout Rooms - Tahawul Tech

Read More..