Extending the Envoy Proxy With WebAssembly – Container Journal

As the service mesh landscape continues to grow, its underlying technology stack is maturing as well. For example, service mesh advocates are introducing methods to extend Envoy, the open source proxy at the heart of many service meshes.

Pioneered by the teams behind Istio and Gloo, the introduction of WebAssembly into Envoy is enabling engineers to add custom filters, offering new controls and filtering abilities for incoming requests. Standardizing the WebAssembly module format could also retain vendor neutrality in a space with competing agendas.

Having bet big on microservices, API gateways and Envoy-based service mesh, Idit Levine now sees WebAssembly as the next big bet. I recently spoke with Levine, Solo.io founder and CEO, to explore ways to extend Envoy using WebAssembly modules and the growing importance of WebAssembly within this burgeoning field.

To understand WebAssembly, you must first understand Envoy and how it fits into the service mesh framework. Service meshes are typically divided into two main componentsa control plane for configuration and a data plane for routing incoming requests to underlying microservices. Envoy sits within the data plane.

In the Envoy-based service mesh architecture, whenever a request comes in, it always goes through Envoy. Envoy is like a filter chain: It takes incoming requests and barrels them through a series of security and operational tasks including authentication, rate limiting, transcoding and routing. This process happens with every request, no matter if its inter-mesh, ingress or egress traffic.

Open source with a growing tooling community, Envoy has become a staple for many service meshes including Istio, Consul Connect, Maesh and Kuma. I dont think anyone should buy any service mesh or gateway that is not Envoy-based, says Levine.

Yet, Envoy is not perfect. Envoy is very powerful, but it leaves a lot to wish for, she notes. The Envoy filter chain is a compelling layer for organizations to add custom capabilities, but Envoy extensibility is not easy.

There are many reasons a team may want to add custom modules to their Envoy implementation. For example, organizations may wish to insert additional business logic, such as metrics, observability, transformation, data loss prevention, compliance validation or other capabilities.

However, writing and adding custom Envoy modules is a bit tedious. You must program in C++ and recompile in Envoy. Ideally, this process should be open to other programming languages. It should also be fast, safe, easy to use and without the need to recompile.

There have been a few efforts to remedy this issue. In Istio, engineers can extend Mixer with an Adapter using Go. Other service meshes have attempted their own custom filter creation.

These efforts move in the right direction, yet they are still problematic, Levine says. Solutions are still not language-agnostic and they present ease-of-use issues. Can we do something better? she asks. For this, Istio and Solo.io looked to WebAssembly.

WebAssembly (Wasm for short) is a binary instruction format for a stack-based virtual machine. The initiative is maintained by a W3C Community Group, representing a collaboration between all major browsers.

Running Wasm in Envoy involves using a placeholder that developers can insert their extensions into. We wrote a Wasm custom filter and wrote a Wasm model for the Envoy memory, Levine says. An Istio blog post details the proposed setup: The proxy extensions are delivered as WebAssembly modules through a level Application Binary Interface (ABI). The WebAssembly for Proxies specification describes the process in detail.

To the layman, that doesnt sound too approachable. So, to improve developer experience, Solo.io built WebAssembly Hub, a center for sharing and finding Wasm extensions. Like Dockerhub, engineers can browse Wasm extension repositories and deploy them to their Envoy-based service mesh or API gateway.

At the time of writing, WebAssembly Hub hosts 367 repositories and counting, featuring contributions from many community members. Examples include transformation for incoming HTTP requests, appending a header, a Rust filter for additional authentication and many other packages.

To Levine, adding custom Envoy filter modules using Wasm and WebAssembly Hub brings numerous benefits:

Levine is also hoping for more industry cooperation through the WebAssembly module format. Enterprise tech has already weathered through vendor wars in the container, orchestration and service mesh areas. I didnt want that to happen againit isnt healthy for innovation, she says.

Naturally, there are some possible downsides to extending your proxies with Wasm. One foreseeable issue is degradation, notes Levine. Theoretically, you could assemble an Envoy chain with thousands of custom filters. But, every new module added increases the overall processing time.

If overused, filters could significantly increase latency, which could be disruptive for time-sensitive applications, such as financial or medical industry scenarios. You just need to be careful about that and design accordingly, she says.

Wasm use should also depend on your environment. Some scenarios, such as container Wasm in Kubernetes, may not be super beneficial, she adds, reinstating Wasm should be extending proxy technology like Envoy. That is where it is more useful.

The introduction of WebAssembly and WebAssembly Hub presents a streamlined way to add more capabilities to a service meshs data plane. There is already big-name support for WebAssembly, including IBM, Google, CNCF and others.

Still, many players are pushing competing agendas in the API gateway and service mesh market ecosystems. Service mesh marketing permeates the cloud discussion, but customers need technology to back it up, Levine challenges.

One silver lining is the fact that Wasm isnt proposing any detrimental change to a companys existing stack; its simply extending functionality where Envoy lacks. Therefore, its not a technology looking for a problem, she says. Its a solution to a problem.

Related

More:
Extending the Envoy Proxy With WebAssembly - Container Journal

Anti-hacking based on the circular polarization direction of light – Science Codex

The Internet of Things (IoT) allowing smart phones, home appliances, drones and self-driving vehicles to exchange digital information in real time requires a powerful security solution, as it can have a direct impact on user safety and assets. A solution for IoT security that has been is a physical unclonable function (PUF) that can supplement software-based key security vulnerable to various attack or physical attack.

Hardware-based PUF semiconductor chips, for example, each have a unique physical code, similar to the human iris and fingerprints. Because the variations in the microstructure derived from manufacturing process act as a key value, the security keys generated via PUFs are random and unique, making it impossible to duplicate. However, there were limitations in that the hardware structure had to be changed in order to increase the number of combinations of keys to enhance cryptographic characteristics.

Under these circumstances, a team led by Jung-Ah Lim and Hyunsu Ju from the Korea Institute of Science and Technology (KIST) Center for Opto-Electronic Materials and Devices announced that they have successfully developed an encryption device that can greatly strengthen the cryptographic characteristics of PUFs selectively detecting circular polarization, without modify the hardware structure, through collaboration with a team headed by Suk-Kyun Ahn, Professor of Polymer Science and Engineering at Pusan National University.

Light, which behaves as both a particle and a wave, can travel in a straight line, while rotating in the form of a spiral, as circularly polarized light.

The core technology applied to the encryption device developed by the KIST and PNU research team is a phototransistor that can detect the circular polarization of light rotating in a clockwise or counterclockwise direction.

The main strategy used in the newly developed photoresistor is a combination of cholesteric liquid crystal and low bandgap -conjugated polymer with excellent near-infrared light absorption and charge transport properties. The cholesteric liquid crystal film has a strong tendency to selectively reflect near-infrared circularly polarized light, as the amount of light reaching the device is controlled according to the rotational direction of the light. In the study, the device exhibited excellent dissymmetry factor for photocurrent with high sensitivity in detecting circularly polarized light.

The research team succeeded in fabricating a PUF device that could serve as a fundamental solution against hacking, wiretapping, etc. by increasing the number of combinations in generating encryption keys using a simple solution process, without changing the physical size of the array.

Dr. Jung-Ah Lim from KIST said, "This study presents measures to implement a new encryption device amidst the need to develop a highly secure cryptographic technology with the advent of the era of IoT.

Dr. Suk-Kyun Ahn from PNU said, "The technology to discriminate the rotational direction of circularly polaized light based on a simple fabrication process is expected to have a strong potential in not only next-generation encryption devices but also dvarious chiroptical optoelectronic applications."

Read the original here:

Anti-hacking based on the circular polarization direction of light - Science Codex

Silex Insight delivers state-of-the-art security features to the award-winning Secure Vault technology from Silicon Labs – Design and Reuse

November 10, 2020 -- Silex Insight, a leading provider of embedded security IP cores, has entered into an agreement with Silicon Labs (NASDAQ: SLAB), a leading provider of silicon, software and solutions for a smarter, more connected world to contribute their security enclave IP (called eSecure) as part of the award-winning Secure Vault technology.

The security landscape is rapidly ever-changing, and IoT developers face increasing pressure to step up device security and meet evolving regulatory requirements. Silicon Labs includes the eSecure from Silex Insight in their Secure Vault to simplify development, accelerate time-to-market and help device makers to make products future-proof by taking advantage of the most advanced integrated hardware security protection IP tool box available today for IoT wireless SoCs.

The eSecure IP platform contributes to the award-winning embedded Secure Enclave, Hardware Root-of-Trust solution providing Secure Boot, and system integrity by ensuring execution of authenticated software, device authentication, cryptographic acceleration plus generation and storage of secure keys and secret information.

The Silex Insights eSecure IP platform delivers great value, aligning well with our needs given its ability to be very scalable and flexible, said Sharon Hagi, Chief Security Officer at Silicon Labs. Our Secure Vault products are the first silicon with an embedded radio to achieve, PSA Certified Level 2, highlighting Silex Insights robust security architecture. In addition to the eSecure secure enclave, we are also using cryptographic processor IPs from Silex Insight given to their efficiency when it comes to extreme low power and performance with respect to the overall silicon area.

We appreciate the fact that our embedded security IP solutions are valued by the market for being worlds leading in flexibility and scalability, ultra-high speed performance and compact footprint. said Pieter Willems, VP of Global Sales and Marketing at Silex Insight. It is exciting to know that our eSecure IP platform in Silicon Labs Secure Vault technology is playing a role delivering secure IoT devices all over the world.

The two companies will continue their collaboration on future solutions designed for secure communication for IoT products.

About Silex InsightSilex Insight is a recognized market-leading independent supplier of Security IP solutions for embedded systems and custom OEM solutions for AVoIP/Video IP codec. The security platforms and solutions from Silex Insight include flexible and high-performance crypto engines which are easy to integrate and an eSecure IP module that provides a complete security solution for all platforms. For custom OEM solutions for AVoIP/Video IP codec, Silex Insight provides high-end image and video compression solutions for distributing low latency, 4K HDR video over IP. Development take place at the headquarters near Brussels, Belgium.

For more information, please visit http://www.silexinsight.com

Read more:

Silex Insight delivers state-of-the-art security features to the award-winning Secure Vault technology from Silicon Labs - Design and Reuse

Hardware Security Module Market to Show an Impressive Growth Over the Forecast Period 2018 to 2028 Future Market Insights – NewsMaker

Future Market Insights has recently published a market research report, according to which, the globalhardware security modulemarket will record a total incremental opportunity of over a billion dollar, during the forecast period of 2018 to 2028.

Hardware security modules serve cryptographic functions, which include encryption, decryption, key management/generation, and hashing. A hardware security module is also referred to as Secure Application Module (SAM), Personal Computer Security Module (PCSM), Tamper Resistance Security Module (TRSM), Secure Signature Creation Device (SSCD), hardware cryptographic device, or cryptographic module.

Security Applications Spreading Roots Fast, in the IoT Space

The rising adoption of next-generation security solutions, which is a remarkable trend in the market, aids in improving the products as well as the operational efficiency of enterprises. Existing security solutions are evolving towards context-aware computing technology, which enables enterprises to detect advanced threats in a drastically changing environment. This factor is expected to create potential opportunities in the global cyber security market over the forecast period.

Enterprises are progressively implementing Internet of Things (IoT)-based solutions. IoT solution providers are integrating cyber security solutions to reduce cyber-attacks on connected devices to identify threats and to resolve susceptibilities before launching their products in the market. With growing applications of security solutions in the IoT space, the demand for hardware security modules is expected to rise significantly over the next few years.

Request a Sample Report @https://www.futuremarketinsights.com/reports/sample/rep-gb-9275

Key Vendors Prioritize Competitive Pricing to Assure Security of Enterprise Ecosystem

Manufacturers are currently offering hardware security module systems that have the means to securely back up the keys that they handle in a wrapped form. Other hardware security modules back up keys via the operating system of computers or by using a smart card or some other externally usable security token.

Hardware security modules can make an organization achieve peak security standards for applications ranging from key management to data encryption and authentication. Hardware security modules play a vital role in an enterprises security ecosystem.

However, the cost-per-unit factor of hardware security modules is significantly higher than their software-based counterparts. Moreover, Hardware Security Module-as-a-Service (HSMaaS) solutions offered by some vendors in the market are expensive. Though hardware security modules offer reliable security, cost is a major factor to be taken care of to capture the market as well as achieve market growth.

Several hardware security module vendors are making efforts to make hardware security module services available at reduced costs by means of cloudHSM. However, the incorporation of cloud in critical applications, such as key management and key storage, through HSM induces problems common to cloud infrastructures. As a result, cloud hardware security module services are still expensive and are required to be further enhanced.

For any Queries Linked with the Report, Ask an[emailprotected]https://www.futuremarketinsights.com/ask-question/rep-gb-9275

SMEs have been known to ignore cyber threats. Such enterprises consider cyber security solutions as a non-priority investment, which is why several start-ups and SMEs incur high losses following ransomware attacks.

National governments across the globe have also started taking initiatives to improve their ICT infrastructure to facilitate digitisation in their respective economies. A major part of the ICT investment is diverted towards cyber security.

Some of the key players in the global hardware security module market research report include Gemalto NV; Thales E-Security Inc.; Utimaco GmbH; IBM Corporation; Futurex; Hewlett Packard Enterprise Company; ATOS SE; Yubico; Ultra Electronics; Swift; Ledger; and Spyrus, Inc.

Contact Sales for Further Assistance in Purchasing this [emailprotected] https://www.futuremarketinsights.com/checkout/9275

Table Of Content

1. Executive Summary

1.1. Market Overview

1.2. Market Analysis

1.3. TMRR Analysis and Recommendations

1.4. Wheel of Fortune

2. Market Introduction

2.1. Market Definition

2.2. Market Taxonomy

3. Global Hardware Security Module Market Background

3.1. Macro-Economic Factors

3.2. Policies and Regulations

3.3. Market Dynamics

3.4. Forecast Factors Relevance and Impact

4. Global Hardware Security Module Market Analysis 20132017 and Forecast, 20182028

4.1. Market Size (US$ Mn) Analysis and Forecast

5. Global Hardware Security Module Market Analysis 20132017 and Forecast, 20182028 By Type

Download Complete TOC Of this Report @https://www.futuremarketinsights.com/toc/rep-gb-9275

About FMI

Future Market Insights (FMI) is a leading provider of market intelligence and consulting services, serving clients in over 150 countries.FMIis headquartered in Dubai, the global financial capital, and has delivery centers in the U.S. and India. FMI's latestmarket research reports and industry analysis help businesses navigate challenges and make critical decisions with confidence and clarity amidst breakneck competition. Our customized and syndicated market research reports deliver actionable insights that drive sustainable growth. A team of expert-led analysts at FMI continuously tracks emerging trends and events in a broad range of industries to ensure that our clients prepare for the evolving needs of their consumers.

Contact

Mr. Abhishek Budholiya

Unit No: AU-01-H Gold Tower (AU), Plot No: JLT-PH1-I3A,

Jumeirah Lakes Towers, Dubai,

United Arab Emirates

MARKET ACCESS DMCC Initiative

For Sales Enquiries: [emailprotected]

For Media Enquiries: [emailprotected]

Website: https://www.futuremarketinsights.com

Research Report: https://www.futuremarketinsights.com/reports/hardware-security-module-market

Press Release Source: https://www.futuremarketinsights.com/press-release/hardware-security-module-market

Continued here:

Hardware Security Module Market to Show an Impressive Growth Over the Forecast Period 2018 to 2028 Future Market Insights - NewsMaker

Chapter 7: The Role of Cryptography in Information …

After its human resources, information is an organizations most important asset. As we have seen in previous chapters, security and risk management is data centric. All efforts to protect systems and networks attempt to achieve three outcomes: data availability, integrity, and confidentiality. And as we have also seen, no infrastructure security controls are 100% effective. In a layered security model, it is often necessary to implement one final prevention control wrapped around sensitive information: encryption.

Encryption is not a security panacea. It will not solve all your data-centric security issues. Rather, it is simply one control among many. In this chapter, we look at encryptions history, its challenges, and its role in security architecture.

Cryptography is a science that applies complex mathematics and logic to design strong encryption methods. Achieving strong encryption, the hiding of datas meaning, also requires intuitive leaps that allow creative application of known or new methods. So cryptography is also an art.

The driving force behind hiding the meaning of information was war. Sun Tzu wrote,

Of all those in the army close to the commander none is more intimate than the secret agent; of all rewards none more liberal than those given to secret agents; of all matters none is more confidential than those relating to secret operations.

Secret agents, field commanders, and other human elements of war required information. Keeping the information they shared from the enemy helped ensure advantages of maneuver, timing, and surprise. The only sure way to keep information secret was to hide its meaning.

Early cryptographers used three methods to encrypt information: substitution, transposition, and codes.

One of the earliest encryption methods is the shift cipher. A cipher is a method, or algorithm, that converts plaintext to ciphertext. Caesars shift cipher is known as a monoalphabetic substitution shift cipher. See Figure 7-1.

Figure 7- 1: Monoalphabetic Substitution Shift Cipher

The name of this cipher is intimidating, but it is simple to understand. Monoalphabetic means it uses one cipher alphabet. Each character in the cipher alphabettraditionally depicted in uppercaseis substituted for one character in the plaintext message. Plaintext is traditionally written in lowercase. It is a shift cipher because we shift the start of the cipher alphabet some number of letters (four in our example) into the plaintext alphabet. This type of cipher is simple to use and simple to break.

In Figure 7-1, we begin by writing our plaintext message without spaces. Including spaces is allowed, but helps with cryptanalysis (cipherbreaking) as shown later. We then substitute each character in the plaintext with its corresponding character in the ciphertext. Our ciphertext is highlighted at the bottom.

Looking at the ciphertext, one of the problems with monoalphabetic ciphers is apparent: patterns. Note the repetition of O and X. Each letter in a language has specific behavior, or socialization, characteristics. One of them is whether it is used as a double consonant or vowel. According to Mayzner and Tresselt (1965), the following is a list of the common doubled letters in English.

LL EE SS OO TT FF RR NN PP CC

In addition to doubling, certain letter pairs commonly appear in English text:

TH HE AN RE ER IN ON AT ND ST ES EN OF TE ED OR TI HI AS TO

Finally, each letter appears in moderate to long text with relative frequency. According to Zim (1962), the following letters appear with diminishing frequency. For example, e is the most common letter in English text, followed by t, etc.

ETAON RISHD LFCMU GYPWB VKXJQ Z

Use of letter frequencies to break monoalphabetic ciphers was first documented by Abu Yusuf Yaqub ibnis-haq ibn as-Sabbath ibn om-ran ibn Ismail al-Kindi in the ninth century CE (Singh, 1999).al-Kindi did what cryptanalysts (people to try to break the work of cryptographers) had been trying to do for centuries: develop an easy way to break monoalphabetic substitution ciphers. Once the secret spread, simple substitution ciphers were no longer safe. The steps are

Eventually, this frequency analysis begins to reveal patterns and possible words. Remember that the letters occur with relative frequency. So this is not perfect. Letter frequency, for example, differs between writers and subjects. Consequently, using a general letter frequency chart provides various results depending on writing style and content. However, by combining letter socialization characteristics with frequency analysis, we can work through inconsistency hurdles and arrive at the hidden plaintext.

Summarizing, monoalphabetic substitution ciphers are susceptible to frequency and pattern analysis. This is one of the key takeaways from this chapter; a bad cipher tries to hide plaintext by creating ciphertext containing recognizable patterns or regularly repeating character combinations.

Once al-Kindi broke monoalphabetic ciphers, cryptographers went to work trying to find a stronger cipher. Finally, in the 16th century, a French diplomat developed a cipher that would stand for many decades (Singh, 1999). Combining the work and ideas of Johannes Trithemius, Giovanni Porta, and Leon Battista Alberti, Blaise de Vigenre created the Vigenre cipher.

Vigenres cipher is based on a Vigenre table, as shown in Figure 7-2. The table consists of 27 rows. The first row of lower case letters represents the plaintext characters. Each subsequent row represents a cipher alphabet. For each alphabet, the first character is shifted one position farther than the previous row. In the first column, each row is labeled with a letter of the alphabet. In some tables, the letters are replaced with numbers representing the corresponding letters position in the standard alphabet. For example, A is replaced with 1, C with 3, etc.

Figure 7- 2: Vigenre Table

A key is required to begin the cipher process. For our example, the key is FRINGE. The message we wish to encrypt is get each soldier a meal.

Write the key above the message so that each letter of the key corresponds to one letter in the message, as shown below. Repeat the key as many times as necessary to cover the entire message

MWCSHHNKXZKNKJJALFR

Figure 7- 3: Selection of Table Rows Based on Key

Our encrypted message used six cipher alphabets based on our key. Anyone with the key and the layout of the table can decrypt the message. However, messages encrypted using the Vigenre cipher are not vulnerable to frequency analysis. Our message, for example, contains four es as shown in red below. A different cipher character represents each instance of an e. It is not possible to determine the relative frequency of any single letter. However, it is still vulnerable to attack.

MWCSHHNKXZKNKJJALFR

Although slow to gain acceptance, the Vigenre cipher was a very strong and seemingly unbreakable encryption method until the 19th century. Charles Babbage and Friedrich Wilhelm Kasiski demonstrated in the mid and late 1800s respectively that even polyalphabetic ciphers provide trails for cryptanalysts. Although frequency analysis did not work, encrypted messages contained patterns that matched plaintext language behaviors. Once again, a strong cipher fell because it could not distance itself from the characteristics of the plaintext language.

Other attempts to hide the meaning of messages included rearranging letters to obfuscate the plaintext: transposition. The rail fence transposition is a simple example of this technique. See Figure 7-4. The plaintext, giveeachsoldierameal, is written with every other letter on a second line. To create the ciphertext, the letters on the first line are written first and then the letters on the second. The resulting cipher text is GVECSLIRMAIEAHODEAEL.

Figure 7- 4: Rail Fence Transposition

The ciphertext retains much of the characteristic spelling and letter socialization of the plaintext and its corresponding language. Using more rows helped, but complexity increased beyond that which was reasonable and appropriate.

In addition to transposition ciphers, codes were also common prior to use of contemporary cryptography. A code replaces a word or phrase with a character. Figure 7-5 is a sample code. Using codes like our example was a good way to obfuscate meaning if the messages are small and the codebooks were safe. However, using a codebook to allow safe communication of long or complex messages between multiple locations was difficult.

Figure 7- 5: Code Table

The first challenge was creating the codes for appropriate words and phrases. Codebooks had to be large, and the effort to create them was significant: like writing an English/French dictionary. After distribution, there was the chance of codebook capture, loss, or theft. Once compromised, the codebook was no longer useful, and a new one had to be created. Finally, coding and decoding lengthy messages took time, time not available in many situations in which they were used.

Codes were also broken because of characteristics inherent in the plaintext language. For example, and, the, I, a, and other frequently occurring words or letters could eventually be identified. This provided the cryptanalysts with a finger hold from which to begin breaking a code.

To minimize the effort involved in creating and toting codebooks, cryptographers in the 16th century often relied on nomenclators. A nomenclator combines a substitution cipher with a small code set, as in the famous one shown in Figure 7-6. Mary Queen of Scots and her cohorts used this nomenclator during a plot against Queen Elizabeth I (Singh, 1999). Thomas Phelippes (cipher secretary to Sir Francis Walsingham, principal secretary to Elizabeth I) used frequency analysis to break it. Phelippes success cost Queen Mary her royal head.

Figure 7- 6: Nomenclator of Mary Queen of Scots (Singh, 1999, loc. 828)

Between the breaking of the Vigenre cipher and the 1970s, many nations and their militaries attempted to find the unbreakable cipher. Even Enigma fell to the technology-supported insights of Marian Rejewski and Alan Turing. (If you are interested in a good history of cryptography, including transposition ciphers and codes, see The Code Book by Simon Singh.)

Based on what we learn from the history of cryptography, a good cipher

makes it impossible to find the plaintext m from ciphertext c without knowing the key. Actually, a good encryption function should provide even more privacy than that. An attacker shouldnt be able to learn any information about m, except possibly its length at the time it was sent (Ferguson, Schneier, & Kohno, 2010, p. 24).

Achieving this ideal requires that any change to the plaintext, no matter how small, must produce a drastic change in the ciphertext, such that no relationship between the plaintext and the resulting ciphertext is evident. The change must start at the beginning of the encryption process and diffuse throughout all intermediate permutations until reaching the final ciphertext. Attempting to do this before the late 20th century, and maintain some level of business productivity, was not reasonable. Powerful electronic computers were stuff of science fiction. Today, we live in a different world.

The standard cipher in use today is the Advanced Encryption Standard (AES). It is a block cipher mode that ostensibly meets our definition of an ideal cipher. However, it has already been broken on paper. AES is a symmetric cipher, meaning that it uses a single key for encryption and decryption. Cryptanalysts have theoretically broken it, but we need better computers to test the discovered weaknesses. It will be some time before private industries have to worry about changing their encryption processes.

A block cipher mode features the use of a symmetric key block cipher algorithm (NIST, 2010). Figure 7-7 depicts a simple block cipher. The plaintext is broken into blocks. In todays ciphers, the block size is typically 128 bits. Using a key, each block passes through the block algorithm resulting in the final ciphertext. One of the problems with this approach is lack of diffusion. The same plaintext with the same key produces the same ciphertext. Further, a change in the plaintext results in a corresponding and identifiable change in the ciphertext.

Figure 7- 7: Simple Block Cipher (Electronic codebook, 2012)

Because of the weaknesses in simple block algorithms, cryptographers add steps to strong ciphers. Cipher block chaining (CBC), for example, adds diffusion by using ciphertext, an initialization vector, and a key. Figure 7-8 graphically depicts the encipher process ( = XOR). The initialization vector (IV) is a randomly generated and continuously changing set of bits the same size as the plaintext block. The resulting ciphertext changes as the IV changes. Since the key/IV pair should never be duplicated, the same plaintext can theoretically pass through the cipher algorithm using the same key and never produce the same ciphertext.

Figure 7- 8: Cipher-block Chaining Cipher Mode (Cipher-block chaining, 2012)

When the CBC cipher begins, it XORs the plaintext block with the IV and submits it to the block algorithm. The algorithm produces a block of ciphertext. The ciphertext from the first block is XORed with the next block of plaintext and submitted to the block algorithm using the same key. If the final block of plaintext is smaller than the cipher block size, the plaintext block is padded with an appropriate number of bits. This is stronger, but it still fell prey to skilled cryptanalysts.

AES, another block cipher mode, uses a more sophisticated approach, including byte substitution, shifts, column mixing, and use of cipher-generated keys for internal processing (NIST, 2001). It is highly resistant to any attack other than key discovery attempts. However, cryptanalysts have theoretically broken AES (Ferguson, Schneier, & Kohno, 2010). This does not mean it is broken in practice; it is still the recommended encryption method for strong data protection.

For additional information on attacks against modern ciphers, see Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno.

The processes underlying all widely accepted ciphers are and should be known, allowing extensive testing by all interested parties: not just the originating cryptographer. We tend to test our expectations of how our software development creations should work instead of looking for ways they deviate from expected behavior. Our peers do not usually approach our work in that way. Consequently, allowing a large number of people to try to break an encryption algorithm is always a good idea. Secret, proprietary ciphers are suspect. A good encryption solution follows Auguste Kerckhoffs principle:

The security of the encryption scheme must depend only on the secrecy of the key and not on the secrecy of the algorithm (Ferguson, Schneier, & Kohno, 2010, p. 24)

If a vendor, or one of your peers, informs you he or she has come up with a proprietary, secret cipher that is unbreakable, that person is either the foremost cryptographer of all time or deluded. In either case, only the relentless pounding on the cipher by cryptanalysts can determine its actual strength.

Now that we have established the key as the secret component of any well-tested cipher, how do we keep our keys safe from loss or theft? If we lose a key, the data it protects is effectively lost to us. If a key is stolen, the encrypted data is at higher risk of discovery. And how do we share information with other organizations or individuals if they do not have our key?

AES is a symmetric cipher; it uses the same key for both encryption and decryption. So, if I want to send AES-encrypted information to a business partner, how do I safely send the key to the receiver?

Managing keys requires three considerations:

Many organizations store key files on the same system, and often the same drive, as the encrypted database or files. While this might seem like a good idea if your key is encrypted, it is bad security. What happens if the system fails and the key is not recoverable? Having usable backups helps, but backup restores do not always work as planned

Regardless of where you keep your key, encrypt it. Of course, now you have to decide where to store the encryption key for the encrypted encryption key. None of this confusion is necessary if you store all keys in a secure, central location. Further, do not rely solely on backups. Consider storing keys in escrow, allowing access by a limited number of employees (key escrow, n.d.). Escrow storage can be a safe deposit box, a trusted third party, etc. Under no circumstances allow any one employee to privately encrypt your keys.

Encrypted keys protecting encrypted production data cannot be locked away and only brought out by trusted employees as needed. Rather, keep the keys available but safe. Key access security is, at its most basic level, a function of the strength of your authentication methods. Regardless of how well protected your keys are when not used, authenticated users (including applications) must gain access. Ensure identity verification is strong and aggressively enforce separation of duties, least privilege, and need-to-know.

Most, if not all, attacks against your encryption will try to acquire one or more of your keys. Use of weak keys or untested/questionable ciphers might achieve compliance, but it provides your organization, its customers, and its investors with a false sense of security. As Ferguson, Schneier, and Kohno (2010) wrote,

In situations like this (which are all too common) any voodoo that the customer [or management] believes in would provide the same feeling of security and work just as well (p. 12).

So what is considered a strong key for a cipher like AES? AES can use 128-, 192-, or 256-bit keys. 128-bit keys are strong enough for most business data, if you make them as random as possible. Key strength is measured by key size and an attackers ability to step through possible combinations until the right key is found. However you choose your keys, ensure you get as close as possible to a key selection process in which all bit combinations are equally likely to appear in the key space (all possible keys).

It is obvious from the sections on keys and algorithms that secrecy of the key is critical to the success of any encryption solution. However, it is often necessary to share encrypted information with outside organizations or individuals. For them to decrypt the ciphertext, they need our key.

Transferring a symmetric cipher key is problematic. We have to make sure all recipients have the key and properly secure it. Further, if the key is compromised in some way, it must be quickly retired from use by anyone who has it. Finally, distribution of the key must be secure. Luckily, some very smart cryptographers came up with the answer.

In 1978, Ron Rivest, Adi Shamir, and Leonard Adelman (RSA) publicly described a method of using two keys to protect and share data; one key is public and the other private. The organization or person to whom the public key belongs distributes it freely. However, the private key is kept safe and is never shared. This enables a process known as asymmetric encryption and decryption.

As shown in Figure 7-9, the sender uses the recipients public key to convert plaintext to ciphertext. The ciphertext is sent and the recipient uses her private key to recover the plaintext. Only the person with the private key corresponding to the public key can decrypt the message, document, etc. This works because the two keys, although separate, are mathematically entwined.

Figure 7- 9: Asymmetric Cryptography (Microsoft, 2005)

At a very high level, the RSA model uses prime numbers to create a public/private key set:

There is more to asymmetric key creation, but this is close enough for our purposes.

When someone uses the public key, or the product of the two primes, to encrypt a message, the recipient of the ciphertext must know the two prime numbers that created it. If the primes were small, a brute force attack can find them. However, use of extremely large primes and todays computing power makes finding the private key through brute force unlikely. Consequently, we can use asymmetric keys to share symmetric keys, encrypt email, and various other processes where key sharing is necessary.

The Diffie-Hellman key exchange method is similar to the RSA model and it was made public first. However, it allows two parties who know nothing about each other to establish a shared key. This is the basis of SSL and TLS security. An encrypted session key exchange occurs over an open connection. Once both parties to the session have the session key (also know as a shared secret), they establish a virtual and secure tunnel using symmetric encryption.

So why not throw out symmetric encryption and use only asymmetric ciphers? First, symmetric ciphers are typically much stronger. Further, asymmetric encryption is far slower. So we have settled for symmetric ciphers for data center and other mass storage encryption and asymmetric ciphers for just about everything else. And it works for now.

Although not really encryption as we apply the term in this chapter, the use of asymmetric keys has another use: digital signatures. If Bob, for example, wants to enable verification that he actually sent a message, he can sign it.

Refer to Figure 7-10. The signature process uses Bobs private key, since he is the only person who has it. The private key is used as the message text is processed through a hash function. A hash is a fixed length value that represents the message content. If the content changes, the hash value changes. Further, an attacker cannot use the hash value to arrive at the plain text.

Figure 7- 10: Digital Signing (Digital signature, 2012)

When Alice receives Bobs message, she can verify the message came from Bob and is unchanged: if she has Bobs public key. With Bobs public key, she rehashes the message text. If the two hash values are the same, the signature is valid, and the data reached Alice unchanged.

If hash values do not match, either the message text changed or the key used to create the signature hash value is not Bobs. In some cases, the public key might not be Bobs. If attacker, Eve, is able to convince Alice that a forged certificate she sends to her is Bobs key, Eve can send signed messages using a forged Bob key that Alice will verify. It is important for a recipient to be sure the public key used in this process is valid.

Verifying the authenticity of keys is critical to asymmetric cryptography. We have to be sure that the person who says he is Bob is actually Bob or that the bank Web server we access is actually managed by our bank. There are two ways this can happen: through hierarchical trust or a web of trust.

Private industry usually relies on the hierarchical chain-of-trust model that minimally uses three components:

The CA issues certificates binding a public key to a specific distinguished name provided by the certificate applicant (subject). Before issuing a certificate, however, it validates the subjects identity. One verification method is domain validation. The CA sends an email containing a token or link to the administrator responsible for the subjects domain. The recipient address might take the form of postmaster@domainname or root@domainname. The recipient (hopefully the subject or the subjects authorized representative) then follows verification instructions.

Another method, and usually one with a much higher cost for the requestor, is extended validation (EV). Instead of simple administrator email exchange, a CA issuing an EV steps through a rigorous identity verification process. The resulting certificates are structurally the same as other certificates; they simply carry the weight of a higher probability that the certificate holder is who they say they are, by

A simple certificate issuance process is depicted in Figure 7-11. It is the same whether you host your own CA server or use a third party. The subject (end-entity) submits an application for a signed certificate. If verification passes, the CA issues a certificate and the public/private key pair. Figure 7-12 depicts the contents of my personal VeriSign certificate. It contains identification of the CA, information about my identity, the type of certificate and how it can be used, and the CAs signature (SHA1 and MD5 formats).

Figure 7- 11: PKI (Ortiz, 2005)

The certificate with the public key can be stored in a publicly accessible directory. If a directory is not used, some other method is necessary to distribute public keys. For example, I can email or snail-mail my certificate to everyone who needs it. For enterprise PKI solutions, an internal directory holds all public keys for all participating employees.

Figure 7- 12: Personal Certificate

The hierarchical model relies on a chain of trust. Figure 7-13 is a simple example. When an application/system first receives a subjects public certificate, it must verify its authenticity. Because the certificate includes the issuers information, the verification process checks to see if it already has the issuers public certificate. If not, it must retrieve it. In this example, the CA is a root CA and its public key is included in its root certificate. A root CA is at the top of the certificate signing hierarchy. VeriSign, Comodo, and Entrust are examples of root CAs.

Read more here:
Chapter 7: The Role of Cryptography in Information ...

Theory of Bitcoin: The Bitcoin White Paper, second paragraph – CoinGeek

Bitcoin is not secured by cryptography! Thats important to understand, and you will understand it better after watching the latest Theory of Bitcoin episode with Bitcoin creator Dr. Craig S. Wright and Money Button founder (and now Engineering Head, Fabriik Smart Wallet) Ryan X. Charles.

Such is the level of minutiae the pair delve into in these conversations explaining Bitcoin philosophy, were in the third episode of the Bitcoin White Paper series and were only up to the second paragraph of the Introduction. However this is probably the right time to go deep, as it brings clarity to the technical details that come later.

Trivia: Dr. Wright prefers Hieronymus Bosch to Van Gogh. Its one of the many points that help to explain Bitcoin without actually talking about Bitcoin; something of which these video discussions have several.

Understanding Bitcoins (non-cryptographic) security model

Much of this discussion revolves around how Bitcoin is made secure. For many years, they point out, academics thought that a decentralized, peer-to-peer, timestamped server was an impossibility. And this is why it was necessary to examine security models outside the computer science field to find the answer.

This is why it was probably only possible for Bitcoin to come from the mind of a polymath whos studied a diverse range of fields. Dr. Wright talks about his experience analyzing the behavior of botnets, the rationality of criminals, and economic incentives both honest and dishonest, and how it led to Bitcoins security model.

Based on cryptographic proof instead of trustwhat does that mean? Charles asks. Dr. Wright explains how this kind of proof can verify an incident occurred, the identity of the parties involved (using external methods), and the details of the transaction itselfbut Bitcoins security is actually economic in nature.

This is why, if you hear someone say Bitcoin is secured by cryptography, it means theyre repeating something theyve heard elsewhere and probably dont understand Bitcoin.

Satoshi Nakamotos words have been misunderstood often. But were talking about normal parlance, not the hijacked language, Dr. Wright says.

Does such thing as cryptographic proof actually exist? Charles asks.

Yes, but only as an attestation. It can attest to a state. In law, digital signatures only work if theyre attached to a real-world identity. Because being able to decrypt something is not proof of anything, by itself.

Ergo, the proof that prevents the double-spending of a Bitcoin transaction is actually Bitcoins public ledger, not the cryptography. The hash itself isnt the security, its the fact you broadcast it to everyone.

Timestamping and the rationality of being honest

Using hashes and proof-of-work is merely the best way to order events in time. And with money transactions, timing is everythingthe first transaction is always the one that counts, at least in terms of what money went where.

Its computing power, CPU power, that processes transactions (not the hashing power itself). Dr. Wright says.

Ive heard people very specifically misunderstand this point, Charles says. This leads to a brief but still-relevant tangent on how and why its been misunderstood, why the rationale and use-cases for BTC seem to change regularly, and the various agendas people may have behind arguments to keep block sizes artificially small.

Economically rational behavior is what keeps Bitcoin honest, because it keeps those whove made large investments in processing Bitcoin transactions honest. It makes no sense to attempt a double-spend even with 51% of the network. Theres the issue of whether any money you could potentially make from doing so is really worth it, for one (spoiler: probably not). There is a cost to committing a crime, Dr. Wright says. How long can you keep the double-spend valid? Can you actually capture the money you made from the action, and then continue to avoid detection and retribution forever? (evidence on the blockchain ledger is permanent and widely disseminated, remember).

Criminals are often more rational in their actions than the average person, Dr. Wright says, for this very reason. Thus, the Bitcoin blockchain itself remains honest even if a few participants arent.

In the last section of the episode theres another tangent into objective truth which leads to a discussion of art appreciation, and the aforementioned Dutch painters. Overall its another fascinating dive into not only Bitcoin, but the minds and motives behind creating it. This extra knowledge not only builds a greater understanding of Bitcoin, but is also strangely comforting the next time you get into a discussion about Bitcoin yourself.

To watch previous episodes of the Theory of Bitcoin, subscribe to theTheory of Bitcoin YouTube channel here.

New to Bitcoin? Check out CoinGeeksBitcoin for Beginnerssection, the ultimate resource guide to learn more about Bitcoinas originally envisioned by Satoshi Nakamotoand blockchain.

Go here to read the rest:
Theory of Bitcoin: The Bitcoin White Paper, second paragraph - CoinGeek

Quantum Cryptography Market is Slated To Grow Rapidly In The Coming Years (2020 2028) – TechnoWeekly

Quantum Cryptography Market Scenario 2020-2028: Latest Analysis

This detailed market study covers Quantum Cryptography Market growth potentials which can assist the stakeholders to understand key trends and prospects in the Quantum Cryptography market identifying the growth opportunities and competitive scenarios. The report also focuses on data from different primary and secondary sources and is analyzed using various tools. It helps to gain insights into the markets growth potential, which can help investors identify scope and opportunities. The analysis also provides details of each segment in the global Quantum Cryptography market

Quantum Cryptography Market

Click here to get sample of the premium report: https://www.quincemarketinsights.com/request-sample-62405?utm_source=technoweekly/SA

Company profiled in this report based on Business overview, Financial data, Product landscape, Strategic outlook & SWOT analysis: PQ Solutions, Infineon, Qubitekk, Quintessence labs, Nucrypt Llc, Crypta Labs, Qutools GmbH, Magiq Technologies, NEC Corporation, Toshiba , among others.

According to the report, the Quantum Cryptography market report points out national and global business prospects and competitive conditions for Quantum Cryptography. Market size estimation and forecasts were given based on a detailed research methodology tailored to the conditions of the demand for Quantum Cryptography. The Quantum Cryptography market has been segmented as By Component (Solutions and Services), BY Services (Consulting and Advisory, Deployment and Integration, and Support and Maintenance), By Security Type (Network and Application Security), By Vertical (Government and defense, BFSI, Retail, Healthcare, Automotive, Others). Historical background for the demand of Quantum Cryptography has been studied according to organic and inorganic innovations in order to provide accurate estimates of the market size. Primary factors influencing the growth of the demand Quantum Cryptography have also been established with potential gravity.

Regional segmentation and analysis to understand growth patterns: The market has been segmented in major regions to understand the global development and demand patterns of this market. By region, the Quantum Cryptography market has been segmented in North America, Europe, Asia Pacific, Middle East & Africa, and South America. The North America and Western Europe regions are estimated to register a stable demand during the forecast period with market recovery from recent slowdowns.

North America region includes the US, Canada, and Mexico. The US is estimated to dominate this market with a sizeable share followed by Canada, and Mexico. The industrial sector is a major contributor to the US and Canada economies overall. Hence, the supply of advanced materials in production activities is critical to the overall growth of industries in this region.

Get ToC for the overview of the premium reporthttps://www.quincemarketinsights.com/request-toc-62405?utm_source=technoweekly/SA

Europe region is dominated by Germany, the UK, France, Italy, and Spain. These countries also have a strong influence on the industrial sector resulting in sizeable demand for the Quantum Cryptography market. Asia Pacific is estimated to register the highest CAGR by region during the forecast period. The presence of some of the high growth economies such as China and India is expected to propel the demand in this region. Besides, this region has witnessed strategic investments by major companies to increase their market presence. The Middle East and Eastern Europe are estimated to be other key regions for the Quantum Cryptography market with a strong market potential during the forecast period. The rest of the World consisting of South America and Africa are estimated to be emerging markets during the forecast period.

This report provides: 1) An overview of the global market for Quantum Cryptography market and related technologies.2) Analysis of global market trends, yearly estimates, and annual growth rate projections for compounds (CAGRs).3) Identification of new market opportunities and targeted consumer marketing strategies for the global Quantum Cryptography market.4) Analysis of R&D and demand for new technologies and new applications5) Extensive company profiles of key players in the industry.

The researchers have studied the market in-depth and have developed important segments such as product type, application, and region. Each and every segment and its sub-segments are analyzed based on their market share, growth prospects, and CAGR. Each market segment offers in-depth, both qualitative and quantitative information on market outlook.

Speak to analyst before buying this reporthttps://www.quincemarketinsights.com/enquiry-before-buying-62405?utm_source=technoweekly/SA

Objectives of this report: To estimate the market size for the Quantum Cryptography market on a regional and global basis. To identify major segments in the Quantum Cryptography market and evaluate their market shares and demand. To provide a competitive scenario for the Quantum Cryptography market with major developments observed by key companies in the historic years. To evaluate key factors governing the dynamics of the Quantum Cryptography market with their potential gravity during the forecast period.

ABOUT US:

QMI has the most comprehensive collection of market research products and services available on the web. We deliver reports from virtually all major publications and refresh our list regularly to provide you with immediate online access to the worlds most extensive and up-to-date archive of professional insights into global markets, companies, goods, and patterns.

Contact:

Quince Market Insights

Office No- A109

Pune, Maharashtra 411028

Phone: APAC +91 706 672 4848 / US +1 208 405 2835 / UK +44 1444 39 0986

Email: [emailprotected]

Web: https://www.quincemarketinsights.com

See more here:
Quantum Cryptography Market is Slated To Grow Rapidly In The Coming Years (2020 2028) - TechnoWeekly

Why You Need an SSL Certificate on Your Website in 2020 – DC Velocity

Technology and data drive the current world we all live within. Repurposing a famous physics law, for everything offline, there is an equal and opposite online presence. It may not hold in every aspect, but for example, the introvert offline can maintain an extroverted profile. The internet has become a space that captures and preserves data reposits.

It holds general data like names, likes, and dislikes to personal data like financial details. While the internet is a reserve of information, much like the deep sea, there's constant lurking danger. Swimming around these data reserves are sharks like hackers and malware. They swim around the personal data and try to do whatever it takes to access such data. Hence the internet welcomes a new 21st-century problem - cybercrime and cyber-attacks.

The internet brings problems like data breaches, hacking, data leak, and much more malware. That is why almost every online portal invests in cybersecurity. It helps in safeguarding personal data that can have negative repercussions if used by the wrong people.

Cybersecurity risk increases when organizations invest in cloud infrastructure but do not invest in securing it. A large chunk of data unsecured can make the organization susceptible to attack. These attacks not only break consumers' trust but also can bring down the entire organization. With the world currently digital, many organizations and countries have witnessed a sharp spike in cyber-attacks in the first quarter of 2020.

In fact, during Covid 19, a sophisticated form of phishing appeared in many inboxes. It contained a malicious link that sent out a virus. But this is countered with the help of implementing cybersecurity measures. There are many types of SSL certificates to pick from, but a popular recommendation is the comodo SSL certificate for all beginners. Let us explore more about them.

One of the most predominant features of an SSL certificate is to convert any website domain from HTTP to HTTPS. It is a data file that is in the original server. They help make SSL/TLS encryption that keeps information under wraps. It helps to encrypt the traffic on your website while identifying the server's identity.

It works like a virtual lock and key mechanism where the SSL certificate digitally binds the files with the cryptographic key. So, when the webserver is activated, the HTTPS and padlocks only allow secure web servers. It essentially protects the server name, domain name, and hostname, but it is not limited. It also helps in binding or encrypting the organization's identity.

It is an investment for almost any organization because it secures the connection between the organization's server (their website) to the internet browser. All SSL certificates function the same way. If you are considering using one, an affordable option to start with is the Comodo SSL Certificate.

An SSL certificate gives recorded data an extra level of protection through encryption. So, what information does it encrypt? Right from email addresses, passwords, names, financial data, etc. It digitally binds all information and provides a useless output for anyone who tries to intercept it. Let us dive into the technicalities of how SSL certificates function.

An SSL certificate uses a component called public-key cryptography. These keys are long strings of generated numbers. Essentially, a public key is a component that is already in the original server and the public domain. So, any data that enters is well encrypted. It is the safest option and a minimum required level of security required for just about any website.

Investing in an SSL certificate provides many benefits. It goes beyond encryption for website visitors and the website owners. Many people or organizations should enjoy the various benefits they enjoy by investing in SSL Certificates. Here are a few:

A website is essentially a file on the owner's computer. Visitors access those files and are easily able to view the website on their device. A website invites other web users to access files on your server, so an SSL certificate is like a security binding. It keeps any threats or unsecured connections away that can create trouble. It helps safeguard the data and the website owner's server. It also helps protect payment details and financial data as well. For any website that is accepting payment, they need to meet some criteria.

In this current day and age, just about anyone can own a website. Regardless, a good website should win the trust of its viewers. An SSL certificate ensures that a website is a secure one. Some SSL certificates verify if the domain name belongs to the stated owner. For some website tech-savvy users, the SSL certificate allows them to verify information, therefore reinforcing trust and validity.

If a website is secure or safe, it is easy to rope new users to the platform. Another bonus is that an SSL certificate is that it helps with SEO. An SSL certificate reflects security in the domain name itself. It also means that Google's SEO algorithm can view it too. An SSL certificate in this way can boost a website's SEO ranking.

An SSL certificate is one of the many security measures you can invest in as a website or business owner. For a good starting point, use the Comodo SSL Certificate, track the progress, understand your websites access points, and build a security strategy for your website. An SSL certificate surely can make or break a data-driven website.

Read the original post:
Why You Need an SSL Certificate on Your Website in 2020 - DC Velocity

How to advance agility in your workplace – IT-Online

Recent events have forced CISOs across all industries to rethink and refine their business continuity plans, write Alain Sanchez and Joe Robertson, chief information security officers at Fortinet.

Not only did the pandemic force organizations to transform their networks to accommodate moving their traditional workforce to work from home (WFH) status, it also forced cybercriminals to adjust their tactics as well.

In the months since the pandemic began, security researchers have documented a dramatic switch in both focus and tactics on the part of cybercriminals. IPS sensors, for example, reported a dramatic drop-in malicious activity aimed at traditional network devices. And at the same time, there has been a corresponding spike in attacks targeting remote workers through attacks targeting email systems, work devices, and home networks.

No plan survives first contact with the enemy

All of this happened at the same time that IT teams were scrambling to ensure that remote workers had access to critical resources. Exponentially expanding support for VPN connections was only part of the overnight battle. In the ensuing activity, some basic security controls such as ensuring that end-user devices were secured, connections were encrypted, and encrypted traffic was inspected fell by the wayside for some.

Even highly prepared organisations found that essential security functions were either not in place, could not scale adequately, or did not perform as expected.

As a former heavyweight boxing champion once famously said, Everyone has a plan until they get punched in the mouth. This sentiment succinctly describes the past several months, and there is an important lesson there for CISOs for the next phase of designing business continuity plans. And that is the need to insert agility into the traditional security trinity of confidentiality, integrity, and availability.

In addition to building systems and strategies designed to keep things private, detect and prevent changes to systems, and ensure networks and devices perform at the required level of service, those systems also need to be able to quickly and automatically adapt to change.

Cybercriminals understand the need for agility

The cybercriminal community has already embraced agility as critical to their operations, moving as fast as the news does. Plus, as the technology used to track them has improved over time, it has forced cyber attackers to adapt and switch tactics faster than before. The most effective cybercriminals run exceptionally agile operations.

Literally within hours of the global pandemics first impact, the Dark Web was filled with bogus offers for medical equipment and medicines, and new attacks, such as ransomware-as-a-service offerings, that could be easily coupled with phishing campaigns. There was also a spike in the prevalence of older exploits targeting consumer-grade networking gear, gaming devices, and entertainment systems connected to remote workers home networks.

This tactic was successful. 60% of organizations revealed an increase in cybersecurity breach attempts following their transition to telework, and 34% reported actual network breaches. Attackers also rely on agility to quickly exploit new unpatched vulnerabilities, live off the land after a successful breach, and evade detection.

Three areas to augment with agility

In response, defenders need to elevate agility beyond a design principle and make it a true end goal, whereby agility is woven into every corner of their security fabric. Following are three areas where agility needs to be aggressively developed and integrated into the broader security strategy.

* Network access agility BYOD, mobility, and IoT have changed the game in terms of network access and, as trends, will defeat any CISO who doesnt have agile network access controls, device visibility, and management solutions in place. Long before the pandemic, an astounding 60% of employees used their personal devices for work purposes. That number has not only risen dramatically since the recent transition to a remote workforce, but those devices are also accessing more critical data and resources than ever before. Even more alarming, but not surprising, is that more than 80% of employees admitted to using unsanctioned web apps for work. Microsofts prediction that 25% of all attacks will target IoT devices this year is now looking to have been a low estimate, given the spike in detected botnets especially the recent growth in the use of older botnet malware, including Mirai and Gh0st. Mirai, first seen in 2016, had moved back into first place among global botnet use by early May, suggesting cybercriminals sought to gain a foothold in enterprise networks by exploiting unpatched devices in home networks. Coming in second was Gh0st, a malware-botnet family originally from 2014, that also targeted WFH users and applications. Gh0st is a remote access botnet that allows an attacker to take full control of an infected system, log keystrokes, hijack live webcam and microphone feeds, download and upload files, and engage in other nefarious activities. A flexible cybersecurity architecture helps organizations not only deploy appropriate controls but automatically keep them updated as new device types are introduced continuously, regardless of whether or not theyve been seen before. And new technologies like SASE enable users to connect from their new home office in the kitchen, basement, or spare room using any device, through any means, to anywhere, securely.

* Multi-Cloud agility The clouds original appeal was that it would be a cheaper place to host data and network infrastructure. But its foremost attribute has turned out to be flexibility. An effective multi-cloud strategy enables the fast establishment of and changes to data stewardship and infrastructure. CISOs can likewise leverage the cloud to enhance the availability and survivability of their networks. They can do so by agilely acquiring or dropping cloud security services and capacity in response to, or even in anticipation of, operational needs. This requires a combination of hardware and virtual-based firewall and other security capabilities that can be agilely deployed, configured, and centrally managed. It also needs to be coupled with a secure means to reach cloud-based resources (for example, through SD-WAN). This not only enables remote workers to access critical applications and services but also becomes the conduit whereby cloud and on-prem security systems can dynamically complement one another.

* Cryptographic agility Today, all Internet security especially in WFH environments is utterly dependent on cryptography for authentication, confidentiality, and integrity (and more). If an adversary can compromise your cryptography, they completely own your companys data and infrastructure. But thats not all. Cybercriminals are also leveraging encrypted tunnels to move malware into and data out of corporate networks. They are counting on the fact that companies do not have adequate horsepower built into their edge security to inspect encrypted traffic.

Addressing these challenges requires two strategies. The first is to establish crypto agility. The good news is that strong cryptographic algorithms, correctly implemented and configured, are unbreakable. But with the stakes so high, organizations need the ability to change to a new cryptographic key and algorithm if an existing one is compromised. CISOs need to ensure that their equipment is crypto agile so they can move from asymmetric algorithms to quantum-resistant algorithms.

The second is scalable performance for edge security devices. The security tools tasked with decrypting and inspecting traffic are notoriously underpowered. This became a critical issue during the transition to WFH, leaving critical traffic either unencrypted or uninspected. Security devices need to be powered by purpose-built processors that enable massive scalability of services without compromising performance or user experience.

Expanding agility to your entire security strategy

Moving to an agility-centric strategy for business continuity planning complements and completes the traditional CIA security hierarchy, enabling a CISO to leverage additional capabilities based on agility. For example, deception technologies can change security configurations to become less predictable (unpredictability being the nemesis of attack planners). ML (machine learning) and AI-based tools can similarly leverage speed and data correlation to out-maneuver an adversary whose attack strategy relies on land and expand techniques.

Conventional wisdom says that success is the result of combining opportunity with preparation. An agile cybersecurity foundation embraces that approach. By acknowledging and addressing the unpredictable nature of defending dynamic systems, organisations can withstand the inevitable cyber equivalent of getting punched in the mouth.

Related

Original post:
How to advance agility in your workplace - IT-Online

New county ordinance to regulate protest and public gatherings – Lexington Dispatch

Sharon Myers|The Dispatch

Davidson County is proposing a new law to regulate gatherings on public property on the heels of months of protest and counter-protest in uptown Lexington surrounding the Confederate memorial.

We have to have something in place, right now we dont have anything, said Davidson County Manager Casey Smith. It is not the intent to infringe with anyones First Amendment rights, but in the times we are living in we need a better way to deal with things like access to public property, signage, and flags.

On Nov. 10, the Davidson County Board of Commissioners will hold a public hearing to receive input on an ordinance to address assemblieson public property to define how and where people can assemble, as well as, what they are allowed to carry or display.

The first amendment of the U.S Constitution gives citizens the right to peaceably assemble, and to petition the government for a redress of grievances or prohibiting the free exercise thereof, or abridging thefreedomof speech, or of the press, or therightof the people.

Government officials cannot prohibit any public assembly on public property, but it can impose restrictions on the time, place, and manner of peaceful assembly, provided that constitutional safeguards are met.

We cant infringe on anyones right to protest. This is a tool for our law officers; it will give them a law to be able to deal with enforcement. Right now we dont have an ordinance that allows them, for example, to tell anyone to remove a flag or sign from a government building or from putting flags on county property, said Smith.

The proposed ordinance follows months of protest and counter-protest focused on the Confederate monument in uptown Lexington, which was removed on Oct. 20. Two groups of protesters were located on county-owned property in front of the historical Davidson County Courthouse and at the square across the street.

Under the proposed ordinance, protestors or assemblies cannot obstruct, interfere or block people entering or exiting vehicles; public buildings; crossing the street or deny the use of any other public areas.

Also, assemblies shall not be conducted on any public roadway used primarily for vehicular traffic, nor interfere with the business of the county or state.

The proposed ordinance limits signs or flags to less than 36 inches and cannot use words that would incite violence. The staff or pole for any sign, flag or banner cannot be made of metal and must be continuously held by a protestor.

If the ordinance is passed it will be unlawful to hang, fasten, or attach banners, flags or electrical devices to any county property including buildings, handrails, fences, bridges, memorials, landscaping, and trees. It also would prohibit the placement of poles, posts, pins, or pegs in the ground on government property.

The ordinance also states that law enforcement is allowed to assign different groups a place to assemble in order to preserve the public peace and that members of a group are not allowed to enter the assigned area of another group. The priority of location would be based upon which group arrived first and is at the discretion of law enforcement.

Also, spectators are not allowed to physically interfere with individuals or groups who are protesting and will not speak fighting words or threats that would tend to provoke a reasonable person to a breach of the peace.

Law enforcement will still be allowed to issue a command to disperse if a threat to the public peace is determined. Officers are also allowed to establish barricades to preserve public peace and it would be unlawful for anyone to intentionally cross over a law enforcement line or barricade.

Under the proposed ordinance, it will be unlawful for anyone to camp or light a bonfire on any public property owned by the county, including public rights-of-way and sidewalks. The county retains the right to remove a temporary shelter, bedding or personal belongings deemed a public nuisance.

If the ordinance is approved, it will be unlawful for any person to use objects to obstruct a public road, sidewalk, right-of-way or any entrance or exit to private property or any other area open to the public. This also includes attaching themselves to another person, building, or vehicle.

The ordinance states anyone who fails or refuses to abide by or violates these rules shall be subject to penalties and arrest.

Smith said after the months of protest and counter-protest, government officials became aware of the impact that not having a set ordinance has had on the public peace. He said the ordinance isto bring a little bit of clarity about what is acceptable and what is not acceptable when protesting.

We need to have a tool for our law enforcement officers to have clear cut rules and regulations, Smith said. Given the world we live in, we need some regulationin case something like this ever happens again. We are not regulating the right to free speech or right to assemble, we are just making the rules realclear.

Go here to read the rest:

New county ordinance to regulate protest and public gatherings - Lexington Dispatch