Page 4,189«..1020..4,1884,1894,1904,191..4,2004,210..»

DUO to increase student internet security – The Crimson While

The University of Alabama is set to begin running a new authentication system designed to better protect students online. The program, known as DUO, is a two-factor authentication system that goes beyond the current system set up on MyBama and Crimson Email.

DUO not only requires students to enter their email and password, but also requires another form of authentication with something a student may have, such as another device or passcode.

"By requiring DUO for all University of Alabama students, we can better protect sensitive student data, precious research data and ultimately the UA community, said Dr. Kevin Whitaker, executive VP and provost. Two-factor authentication is quickly becoming the new standard in data protection.

The resolution to implement DUO was passed by the Student Government Association in the fall semester of last year and will be required by all students on Oct. 2 of this year.

Interested students can activate their DUO account before then by visiting duo.ua.eduand will enable the authentication system both MyBama and Crimson Email. Students must follow the online screen prompts and download the DUO mobile app to completely set up your account. For more information, contact the Office of Information Technology at 205-348-5555 or itsd@ua.edu.

See the original post here:
DUO to increase student internet security - The Crimson While

Read More..

Online threats lead to real-world harm, say security experts – CNBC

A lot of these attacks include malware that's written to gather information on people, companies, governments and other entities. Once uncovered, this information can be used to threaten or harm people in the real world.

Even the mere threat of harm in the real world as a result of online behavior is enough to have an impact.

For example, Google employees who had their names published by right-wing provocateur Milo Yiannopoulos feared harassment after they posted comments critical of fired company engineer James Damore on an internal chat service. The so-called doxxing activity caused Google CEO Sundar Pichai to cancel a company-wide meeting to discuss Damore's firing.

"Things that happen online, like doxxing, have effects in the real world," says Alex Stamos, chief security officer for Google's chief rival, Facebook, at the same forum.

"It becomes a safety issue" in the real world for those who don't have a way to protect their information online, said Stamos.

"We track dozens and dozens of different types of harm" attempted on Facebook users, says Stamos, who also said Facebook turns off more than 1 million accounts per day over fraud, spam and hate speech.

While online attacks against large companies such as Sony and Target -- or celebrities like Jennifer Lawrence -- garner the most media attention, attacks against individuals are becoming increasingly common and damaging, according to Stamos.

"Things have shifted a lot away from attacks against large enterprises and large, well-protected organizations toward attacks against unprotected individuals who are aligned with them," Stamos said last week in San Francisco.

As an example, he pointed to the hack of emails sent by the campaign of Democratic presidential candidate Hillary Clinton last year, which were lifted from the laptop of the campaign's chairman, John Podesta.

"The internet is real life and real life is the internet," says the EFF's Galperin.

See more here:
Online threats lead to real-world harm, say security experts - CNBC

Read More..

Net neutered: When ISPs like Comcast crash the cloud – ZDNet

(Image: ZDNet)

While doing some research on public cloud-based backup to blob storage solutions, I decided to tinker with the possibility of using Azure not just as my backup target but as a replacement for my main file server sitting under my desk.

I had already gone through the process of eliminating all my rack mount systems from my house that were taking up space and consuming too much electricity. These were being used for test purposes and it was easy to replace them with IaaS VMs in Azure.

Using public cloud as your file server, though, that's a bit different. It's actually quite easy to do as a small business; the Azure file service makes it easy to turn on SMB/CIFS file sharing with any storage account.

It doesn't consume compute, just storage costs, but it acts just like any other file server or NAS device on-premises.

And if your business uses business-class broadband, such as an MPLS connection to a Tier-1 telco, it works great. But if you are a SOHO-based business and are using consumer-class broadband, not so much.

It's got nothing to do with Azure's technology -- that part works great. The problem has to do with what providers like Comcast are doing with access controls on their networks.

When I was setting up my Azure file services, I discovered that I could not map a drive from Windows to the file storage. At first, I thought I had something in my firewall set wrong.

Nope. Even with my PC set to ANY/ANY exclusions coming from that MAC address, I still couldn't connect to it.

After some trial and error and some basic geek forensics, I determined that one of the ports that the SMB protocol uses -- TCP 445 -- was being blocked upstream. So I called my broadband company, Blue Stream, which maintains the local cable infrastructure in the town where I live in South Florida.

Nope, no ports being blocked there.

But do you know where lots of ports are being blocked? Comcast, which is Blue Stream's upstream bandwidth provider.

Comcast presumably blocks port 445 because it is used by the WannaCry malware to spread between systems. However, it's also the port Microsoft Active Directory uses.

So, if you use Comcast, but want to develop and test file services on Azure, you're going to have to establish a VPN connection, which kind of defeats the purpose of being able to access your file services from any mobile device.

Comcast is not the only provider that blocks certain ports. AT&T does, as do others.

I understand ISPs wanting to be proactive about security, but blocking ports that essentially disable functionality on major cloud services is unacceptable.

I feel... Comcastrated.

Now, Microsoft could fix this problem by making protocol changes to SMB -- by having it communicate over alternate ports and being able to configure that in Azure. But that means making changes to the Windows OS communications protocol stack and pushing that out to tens of millions of systems.

It also would mean changes in the SMB/CIFS standard as well, and that would need to be rolled out to SAMBA and anything else that needs that protocol including all sorts of NAS devices that run on Linux and other derivative OSes.

SMB is just one protocol. There are others that are needed for so many other apps. We can't change or replace all of them every time a new piece of malware comes out.

What we need is a better solution for monitoring network traffic and acting on threats at the residential level rather than blocking ports wholesale.

Ideally, it would be great to be able to provide a deep packet inspection device to every home, but this type of technology is typically deployed at enterprises and it starts at around $1,000 an appliance and can cost upward of thousands of dollars a year for the subscription, depending on the vendor.

First, there's no reason why the industry cannot develop a packet inspection and intrusion detection/web application gateway using open source components and then deploy it in a multi-tenant fashion at the provider at the edge of the network, with some sort of an app that the home broadband customer can use to secure their traffic in an easy, wizard-like, self-service fashion.

Log threats going in and out, get notifications on strange activity, all that good stuff.

Perhaps provide unified threat management and deep packet inspection as a value-added service. Managed internet security for residential customers and small business.

As more and more of our services go cloud-based, particularly with the proliferation of Internet of Things devices that need to have constant connectivity, we are going to need to find a better way to deal with the issues of proactive monitoring and acting on internet traffic coming from the home, versus ham-fisted and draconian methods such as port blocking that diminish the value of the broadband connectivity in the first place.

This isn't just an issue of net neutrality; it's the only way we are going to be able to seamlessly move to the cloud, long term. The price of entry should not have to be a direct Tier-1 leased line, with an enterprise class service-level agreement and a private virtual circuit to the cloud provider.

Cloud services should be accessible to everyone. It is possible to be both safe and open, but it will require a re-thinking of how providers allow access to those pipes.

Original post:
Net neutered: When ISPs like Comcast crash the cloud - ZDNet

Read More..

Bitcoin jumps nearly 70% for August to record high, offshoot ‘bitcoin cash’ falls to more than one-week low – CNBC

Some analysts also attributed bitcoin's gains to investors looking for a safety trade after North Korea fired a ballistic missile over Japan.

"With both bitcoin and ether, we're seeing a flight to safety due to the issues in North Korea, similar to when investors previously flocked to gold out of equities during previous wars," said Andrew Keys, head of global business development at blockchain software developer ConsenSys.

Demand for bitcoin and ethereum from Japanese and South Korean investors remained strong, according to CryptoCompare. The site showed trade in the Japanese yen and South Korean won accounted for nearly half of all bitcoin trade volume, while won-denominated ethereum trade accounted for about 22 percent.

Asian stocks closed mostly lower, European markets fell more than 1 percent and U.S. stocks opened lower after North Korea late Monday Eastern Time fired a ballistic missile over Japan. Local broadcaster NHK said Japan took no action to shoot down the missile, which later broke into three pieces and fell into the sea.

U.S. stocks recovered most of their losses to trade narrowly mixed midday Tuesday.

Gold futures for December delivery extended Monday's jump to climb more than half a percent Tuesday to $1,331.90 an ounce, their highest since Nov. 9.

Many digital currency enthusiasts expect bitcoin to become the "digital gold" of cryptocurrencies since its supply is limited to 21 million but demand remains strong as many investors use bitcoin as their way into the digital currency world.

That said, bitcoin is far from reaching the same status as the precious metal. About $7.5 trillion of gold is in circulation, while the value of all digital currencies only reached $160 billion Tuesday, according to CoinMarketCap. Bitcoin had the largest share at nearly $75 billion, while ethereum was second with a market value of $34.7 billion, the site showed.

See the original post:
Bitcoin jumps nearly 70% for August to record high, offshoot 'bitcoin cash' falls to more than one-week low - CNBC

Read More..

Bitcoin Foundation seeks legal protection from US currency regulation – The Independent

LlewClaasen,Executive Director of The Bitcoin Foundation, has announcedthat the organisationhas retained legal counsel to advisein its effort to fight against increasing federal and state regulation in the US. The foundation believes that increases in regulation are attempts to control and stifle the adoption and use of so-called virtual currencies such as Bitcoin.

In a press release, Claasen claimed that the organisations first priority is to attempt to build a more open and diverse dialogue with the USCongress. The effort is a response to the planned introduction of a bill thataims to bring Bitcoin into the scope of USmoney-laundering enforcement agencies.

Bitcoin is a virtual currency or "cryptocurrency" thatwas created by an unknown programmer (or group of programmers) under the name of Satoshi Nakamoto in October 2008. Unlike traditional forms of currency, Bitcoin and other cryptocurrencies use encryption techniques to regulate the generation of currency and thetransfer of funds. This means that the currency is decentralised so no single institution controls the Bitcoin network. At the time of writing, one Bitcoin is approximately worth 3,365.27.

Because of encryption, the use of Bitcoin can remain anonymous. Though receipts of transactions are stored in "blockchains", users of the currency do not have their names, address, or other forms of personal information attached to their Bitcoin profiles. While some high street shops and bars accept the currency, many people associate the use of Bitcoin with the buying and selling of illicit services on the dark web.

Just last month two of the dark webs largest markets "Alphabay" and "Hansa"were seized in a joint effort from European police, Interpol, the FBI and the DEA. The websites users bought and sold drugs and chemicals from one another using Bitcoin to protect their identities.

US Attorney General Jeff Sessions said in response that, This is likely one of the most important criminal investigations of the year. He also claimed that The dark net is not a place to hide. We will find you.

The Bitcoin Foundation is, however, more optimistic about the future and use of the virtual currency. Their vision is to turn Bitcoin into a globally accepted method of exchanging and storing value which will operate without the need for third parties like banks.

In the release, Claasen said that, the increased regulatory push by federal and state authorities, if it continues, is sure to threaten the existence of the fintech[financial technology] industry nationwide.

MrClaasen added: Just as the fintech industrys use of cryptocurrency was stifled in New York by the adoption of the so-called Bitlicence, it is highly likely that increased regulatory and legislative burdens [placed upon Bitcoin] will have a similar negative impact.

The Bitcoin Foundation was founded as a non-profit in September 2012. The body'smission statement is to ensure that every human has the right to privacy in transactions that involve no harm to others and the right to economic participation without a bank account or credit history.

In their efforts to defend Bitcoin, The Bitcoin Foundation has retained the Ciric Law Firm, PLLC for counsel. The firm is currently challenging the US Department of Financial Services Virtual Currency regulation (Part 200 of Chapter 1 of Title 23 of the New York Codes, Rules and Regulations), which was promulgated in 2015 and is also known as the New York "Bitlicence".

Speaking to The Independent, MrClaasen said, state and federal legislation creates hurdles for innovation, well in advance of knowing what the impact of the technology is going to be or what it enables.

[The Bitcoin Foundations] view is that it is not yet clear what bitcoin and cryptocurrencies are. But by regulating the technology prematurely, you put it into a box it might not fit into later on. Its not that we dont believe theres a time and place to regulate Bitcoin, were just saying that its too early and that regulation will just do harm to very innovative businesses and technologies.

When questioned on Bitcoins potential to be used for fraud, money laundering and the buying and selling of illicit goods, MrClaasen said, Reports by the European commission in June specifically found that there is very little of that activity, particularly there is very little terrorist funding and money laundering.

Claasen added: Bitcoin is too hard for criminals to use at the moment. Its easier for a criminal to use the United States dollar.

Alongside being the foundation's Executive Director, MrClaasen is a member of the international marketing advisory boards the CMO Council Advisory Board for Africa, the Customer Experience Boardand The Forum to Advance the Mobile Experience. He is also the co-founder of Clicks2Customers, a digital marketing agency with annual billings of over 80 billion.

Claasen made it clear that Bitcoin Foundation, doesnt want to break the system, but it is concerned that the system is already broken.

Bitcoin has the potential to be a store of value thats outside the control of central banks. In the future, we would like to see more adoption of Bitcoin. Its not going to be the only currency, and it wont replace the current system, but among other options its a useful case for the future.

The venture capitalist from Cape Town claims that Bitcoin is not currently at a stage where there are concerns that it will interfere with global monetary policy.

Its immature technology, he claims. There is a perception that it allows unlimited transfer of value, but it can only do three or four transfers a second. The network cannot handle larger transactions.

A key reason Claasen opposes regulation is because, it is not possible for governments to take the view they want to regulate Bitcoin. Its important to understand that a decentralised currency means one which is not under control by anybody.

I understand that regulators need to protect the currency and people from risk. [In the future] regulators will probably regulate at the end points of the cryptocurrency network. I get that, its inevitable. Around the world the view is the same. But governments and financial services are already struggling, as in Venezuela, and people need an alternative way.

Llew Claasen concluded that,Aside from other things, [Bitcoin] is a positive technology. It is not one that seeks to destroy or disrupt. Its a pity when regulators view it as something that is dangerous.

More:
Bitcoin Foundation seeks legal protection from US currency regulation - The Independent

Read More..

Why Miners Are Mining Bitcoin Cash and Losing Money Doing It – CoinDesk

Jimmy Song is a bitcoin developer and principal architect at blockchain technology startup Paxos.

In this opinion piece, Song discusses mining patternson the bitcoin cash blockchain, theorizing on what they might indicate about the incentives powering the new cryptocurrency.

Over the weekend, the bitcoin cash blockchain experienced a notable technical change.

Like the bitcoin blockchain from which it forked, bitcoin cash is hard-wired to adjusthow hard it is for miners to claim its rewards, and on Saturday, it saw such a change. As a result, bitcoin cash was made 300% more difficult to mine.

This, in turn, caused the profitability of the coin to decrease dramatically. Many miners left for bitcoin, and for about 10 hours only a few blocks were found.

As a result, emergency difficulty adjustments (a technical mechanism unique to bitcoin cash) were triggered, causing the difficulty to drop enough for miners to begin switching back.

What's interesting, however, is that at the time, bitcoin cash was stillless profitable to mine than bitcoin by about 20%. Still, many miners, including those using pools like BTC.Top, ViaBTC and AntPool continued dedicating computing power to the blockchain.

This means these miners were likely giving up profit that they could have earned had they been mining bitcoin.So what gives? And why are miners mining at a loss?

This is not an easy question to answer and my analysis here is speculative. But, here are some possibilities:

Miners may be committed to making the new cryptocurrency work, as they may have now accrued a large bitcoin cash position.

Armed with this vested interest, they may believe slow blocks will cause bitcoin cash to tank, so they may be mining to keep the network working smoothly.

The argument against this is that during the 10-hour window after the non-emergency difficulty adjustment, many of the same miners left. If consistent blocks were the major concern, there should have been more mining power on bitcoin during that interval.

The miners mining now may be thinking that the bitcoin cash price will increase in the near future to make mining worthwhile. A 3040percent increase in the bitcoin price relative to bitcoin would certainly make their mining profitable, and they may be waiting until then to sell.

These miners may have insider information about a large buy order or may be just hoping for larger fluctuations of bitcoin cash price.

Another theory is that there may be bitcoin cash supporters that are subsidizing mining in some way, behind the scenes.

This could be something like an over-the-counter market for bitcoin cash where buyers are paying a higher price than the exchanges to incentivize mining. If the buyers demand freshly minted bitcoin cash, this would effectively make it so miners were the only supply that could satisfy this particular demand.

Similarly, bitcoin cash supporters could simply be paying pools to point hash power the blockchain network.

Ultimately, there are now more questions than answers.

We don't really know why miners are mining bitcoin cash instead of bitcoin. But, we know that at the very least, they aren't making as much money as they could, and this means these miners are paying some opportunity cost in order to mine bitcoin cash.

Gold panning image via Shutterstock

The leader in blockchain news, CoinDesk strives to offer an open platform for dialogue and discussion on all things blockchain by encouraging contributed articles. As such, the opinions expressed in this article are the author's own and do not necessarily reflect the view of CoinDesk.

For more details on how you can submit an opinion or analysis article, view our Editorial Collaboration Guide or email [emailprotected].

Read more here:
Why Miners Are Mining Bitcoin Cash and Losing Money Doing It - CoinDesk

Read More..

Bitcoin’s epic rise leaves late-1990s tech bubble in the dust – Economic Times

Bloomberg|

Updated: Aug 30, 2017, 03.50 PM IST

Unless youve been living under a rock, youre probably aware that bitcoin and a number of other digital currencies have seen some pretty crazy runs this year.

Bitcoin, the best-known digital currency, has surged 358 percent. While staggering, lesser-known competitors have seen even bigger gains, such as the more than 4,000 percent increase for ethereum.

Bespoke Investment Group contrasted the rise in bitcoin with infamous bubbles such as the tech market in the late nineties. Theres almost no comparison. Tech stocks rose just over 1,000 percent over the entire course of their bubble, and bitcoin is already up more than twice that. Take a look.

Bitcoin likely to split into two, thanks to bitcoin cash

All that glitters is bitcoin now

Singapore startup takes bitcoin into real world with visa

FM Arun Jaitley holds meeting on bitcoins

Go here to see the original:
Bitcoin's epic rise leaves late-1990s tech bubble in the dust - Economic Times

Read More..

Encryption in Office 365 – Office 365

At a high level, encryption is the process of encoding yourcontent (referred to as plaintext) into ciphertext that cannot be used by people or computers unless and until the ciphertext is decrypted. Decryption requires an encryption key that only authorized users have. Encryption helps ensure that only authorized recipients can decrypt your content, such as email messages and files.

Encryption by itself does not prevent content, such as files or email messages, from getting into the wrong hands. Encryption is part of a larger information protection strategy for your organization. By using encryption, you can help ensure that only those who should be able touse encrypted content are able to.

You can have multiple layers of encryption in place at the same time. For example, you can encrypt email messages and also the communication channels through which your email flows. With Office 365, your content is encrypted at rest and in transit, using severalstrong encryption protocols, and technologies that include Transport Layer Security/Secure Sockets Layer (TLS/SSL), Internet Protocol Security (IPSec), and Advanced Encryption Standard (AES).

More:
Encryption in Office 365 - Office 365

Read More..

Need-to-Know Only: Use Encryption to Make Data Meaningless to … – Security Intelligence (blog)

Organizations continue to be plagued by data breaches, and data is leaking from our enterprises in large quantities. However, data leakage is not the only issue. The problems namely, regulatory fines, brand damage and lost revenue begin when sensitive data that is readable and accessible falls into the wrong hands. Despite these concerns, security professionals can rest assured that there is a way to immediately stop the madness: Use data encryption.

Data encryption has existed for thousands of years. During all those centuries, the use of encryption has adapted and grown to meet various needs. Back in the day, simple substitution ciphers or scytales worked great, but todays environment demands methods more rigorous than block encryption.

Just as wizards of technology do not rest on their laurels with a single spell or potion, is it not a good idea to only have one type of encryption in your tool set. Those wizards excel by having a rich set of technologies to choose from, and the skills to use them in a dynamic and challenging world.

There is no doubt that encryption and key management algorithms must be publicly vetted to ensure their strength. However, the application of those algorithms must also be flexible enough to meet organizations needs. For example, we all know what a Social Security number (SSN) looks like: It consists of three numeric digits, followed by two digits, and then another four (i.e., 111-22-3333). If we were to encrypt that data, we might end up with a string of numbers, letters and special characters that would prevent an intruder from recovering the SSN, but it could break many applications and databases that process data without maintaining the well-defined format of an SSN. This principle also applies to encrypting names, phone numbers and email addresses.

If we cannot encrypt this data, how can we keep it secure? With the right set of capabilities, you can protect specific types of data using the same cryptographic principles in a way that does not interfere with business applications. This enables you to employ one of the following three fundamental encryption techniques.

Encryption, tokenization and redaction are just three options for obfuscating data. Remember that any good encipherment or encoding approach must follow the basic tenants of cryptography. That means knowing the algorithm should offer no advantage in decoding or deciphering data. The only way you should be able to decipher the data is by having access to the decryption key.

While its crucial for data in new sources and technology platforms to be protected and encrypted, legacy systems frequently contain large quantities of important, valuable data that still need protection. Using cryptographic tools, including file and database encryption, tokenization and Teradata encryption, allows organizations to protect data flexibly while supporting the full technology environment.

Think of data encryption as an easy way to protect data from misuse. By using it, you can get terrific results without having to work as hard as those technology wizards.

IBM Announces New Guardium Data Encryption v3.0 Portfolio

Original post:
Need-to-Know Only: Use Encryption to Make Data Meaningless to ... - Security Intelligence (blog)

Read More..

Four strategies to prevent data encryption from hijacking your network – Digital News Asia

WHILE encryption can keep your network traffic safe from hackers and cybercriminals, it can also prevent your security and monitoring tools from seeing inside the packets crossing your network.

Knowing that many organisations pass encrypted traffic into their networks without full inspection, the bad guys use encryption to hide malware and launch attacks, effectively hijacking your network.

To keep defenses strong while limiting the risk of security breaches and data loss, you need to decrypt, examine, and re-encrypt all network traffic.

The burden of decryption

Devices for decryption must be powerful. Encryption algorithms are becoming longer and more complex to withstand hacking.

A test done by NSS Labs several years ago found that moving from 1024- to 2048-bit ciphers caused an average performance drop of 81% on eight leading firewalls . However, SSL decryption does not need to be performed on a firewall.

New strategies are available to offload decryption and send plain text to tools, enabling them to work efficiently and process more traffic. Here are four strategies to make decryption easier, faster, and cost-effective.

Strategy 1: Remove malicious traffic before decrypting

Many IP addresses used in cyberattacks are reused and known in the security community. Dedicated organisations track and verify known cyber threats on a daily basis, maintaining this information in an intelligence database. By comparing incoming and outgoing packets against this database, you can identify malicious traffic and block it from your network.

Because the comparison is made with packet headers in plain text format, this strategy eliminates the need to decrypt the packets. Eliminating traffic associated with known attackers reduces the number of packets to decrypt. And, eliminating traffic that would otherwise generate a security alert helps security teams improve productivity.

The fastest way to deploy this strategy is to install a special-purpose hardware appliance called a threat intelligence gateway in front of a firewall. This appliance is designed for fast, high-volume blocking, including untrusted countries, and is updated continuously by an integrated threat intelligence feed.

Once the gateway is installed, no further manual intervention is required, and no filters need to be created or maintained. Malicious traffic can be either dropped immediately or sent to a sandbox for further analysis.

Depending on your industry and how often you are targeted, you could see up to an 80% reduction in security alerts.

Alternatively, you can configure custom filters on your firewall to block specified IP addresses. Unfortunately, firewall filters must be manually configured and maintained, and there is a limit to how many filters can be created.

The explosion of connected devices and compromised IP addresses outstrips the capabilities of firewalls. Plus, using the processing cycles on an advanced device like a firewall to make simple comparisons is not a cost-efficient way to block traffic.

Strategy 2: Look for advanced decryption capabilities

Once the encrypted packets traveling from or to malicious sources is removed, a decryption device is needed to process the rest. Many security tools, such as next generation firewalls (NGFW) or intrusion prevention systems (IPS), include an SSL decryption feature.

However, a paper issued by NSS Labs warned that some tools may not have the latest ciphers, may miss SSL communications that occur on non-standard ports, may be unable to decrypt at advertised throughput, and may even fast-path some connections without performing decryption at all.

Cryptography relies on advances to stay one step ahead of the bad guys. Security solutions need to support the latest encryption standards, have access to a wide variety of ciphers and algorithms, and have the power to decrypt traffic using the larger 2048- and 4096-bit keys as well as newer Elliptic Curve keys.

As security technology grows in complexity, solutions must be able to process decryption efficiently and cost-effectively without dropping packets, introducing errors, or failing to complete a full inspection.

As the volume of SSL traffic increases, the quality of a decryption solution is more important to achieving total network visibility. In addition, Defense in Depth is a widely regarded best practice, which often involves multiple best-of-breed security devices (such as a separate firewall and IPS).

It is very inefficient for each of these devices to decrypt and re-encrypt traffic separately, which both increases latency and reduces policy effectiveness and end-to-end visibility.

Strategy 3: Choose tools with operational simplicity

Another key feature is the ease with which administrators can create and manage policies related to decryption. This is important in industries that must comply with the mandates of Health Insurance Portability and Accountability Act (HIPAA), Federal Information Security Management Act (FISMA), Payment Card Industry Data Security Standard (PCI DSS), Sarbanes- Oxley Act (SOX), and other standards.

The best solutions provide a drag-and-drop interface for creating filters and the ability to selectively forward or mask information based on pattern recognition (such as social security numbers).

They also make it easy to keep a complete record of each SSL cipher used and all exceptions related to dropped sessions, SSL failures, invalid certifications, and sessions not decrypted for policy reasons. These detailed logs are valuable for audits, forensics, and network troubleshooting and capacity planning.

Strategy 4: Plan for cost-effective scalability

As the volume of encrypted traffic increases, decryption will have a greater impact on the performance of your security infrastructure. It pays to plan ahead. While it may seem logical to simply turn on the SSL decryption feature in a firewall or unified threat management (UTM) solution, decryption is a process-intensive function.

As SSL traffic increases and more cycles are required for decryption, performance will begin to suffer, and tools may begin to drop packets.

To increase the flow of traffic through a multifunction device, the only option is to increase overall capacity. Adding capacity is a significant capital expense and some features have an extra cost to ensure the device can handle decryption.

A better option is to use a network visibility solution or network packet broker (NPB) with SSL decryption to offload security tools. Many organisations use NPBs to aggregate traffic from across the network, identify relevant packets, and distribute them at high speed to security tools.

NPBs using hardware acceleration can process traffic at line rate with no packet loss, and can automatically load balance. They also eliminate the requirement for multiple inline devices to each perform independent decryption/re-encryption.

The cost of scaling an NPB is lower than scaling most security appliances, and can provide a quick return on investment.

Conclusion

As more of the Internet shifts toward encrypted traffic, attacks in SSL traffic will become more common. To protect data and networks from hackers and cybercriminals, it is essential to inspect all encrypted network traffic.

An organisation that does not develop a rigorous approach to inspecting encrypted traffic will undermine network security, creating an unacceptable risk of breach and data loss.

Fortunately, new solutions are emerging that improve the efficiency and cost-effectiveness of SSL decryption.

Phil Trainor is head of Security Business at Ixia, Asia Pacific.

Related Stories:Cybersecurity still not a top priority for local enterprisesSophos advises companies to tread carefully with IoTThe smarter way of dealing with cyberattacks

For more technology news and the latest updates, follow usonFacebook,Twitter or LinkedIn.

Read more here:
Four strategies to prevent data encryption from hijacking your network - Digital News Asia

Read More..