Encryption – The First Line Of Defense For Big Data

Encryption and Big Data

According to estimates by Hewlett Packard, the average U.S. firm can expect to lose $15 million each year as a result of cybercrime. This number is twice the global average, but it is a preventable expense. As data continues to migrate to the cloud, the cost of bad security will only continue to rise. Threats to digital commerce are no longer as simple as email attachments or phony messages from Nigerian princes. DDOS attacks can bring your entire business to a crawl. Social engineers can gain access to admin level accounts with a five minute phone call. Packet sniffer programs can let hackers pear into private data to gain access to information needed to steal an identity. By using strong security protocols and in depth encryption, companies can avoid the massive impact that cybercrime can cause.

TSL and SSL

The Transport Security Layer and Secure Socket Layer are both part of the standard suite of internet protocols. The term SSL is used to refer to both, and encrypting the SSL is one of the main ways that businesses try to guard against unlawful access. The simplest kind of protection is a key exchange. In this method, both parties hold a public and private key. The public key works similarly to a padlock where the private key is the matching key.

When data is sent, the sender encrypts the data with the public key of the receiver, and the receiver will use their private key to unlock the data. This is a difficult encryption to break, but it is not foolproof.

The SSL will also use Cipher suite encryption to further protect data. This process begins by both the sender and recipient “handshaking“; establishing the desired method of encryption and other protocols to be used in their communication. This handshake includes a key exchange but it also has three other key features: the bulk encryption of all data sent (including the keys), the message authentication code (so hackers can’t insert their own false messages into the conversation), and the pseudorandom function (which defines a random starting point for the values of all keys used in the encrypted session).

With the full Cipher suite in deployment, most data can be deemed mostly safe. No security system is perfect, and data being mostly safe is often as good as it needs to be. However, for some of the most important transactions, mostly safe is simply not enough.

It is impossible to be 100% secure against a hacker, but it is possible to be not worth the effort. Once your data becomes so secure that hackers have no profit margins from breaking in, they will stop expending the effort. To that end, a further level of security is needed. While the basic SSL suites are effective, they are also common targets of attacks. What is needed is a third party proprietary suite that encrypts data in more advanced ways.

Monitoring Encrypted Traffic

According to Blue Coat, the first key beyond standard suites is the monitoring of encrypted traffic. Many attacks on the cloud are encrypted to make detection without opening the data difficult. Advanced security suites are able to scan for these encrypted suites without allowing the dirty data onto your network. In the event an attack does make it into the network, modern suites are equipped with highly advanced analytic tools that help to quickly identify the breach and work to prevent this attacker from gaining unrestricted access.

After the attack, third party protection companies provide the analysis of what happened that is needed to identify and close loopholes in security. They look at how the attacker got in, what they could access, when the threat was detected, and help to detail the actions needed to ensure this sort of attack can cause no further harm.

In an age of cloud based companies and global workspaces, bad cyber security is even more costly than leaving the front door unlocked all night. With due diligence, SSL encryption methods, and the help of a third party software suite, companies can mitigate large portions of the cost of cybercrime.

By Cameron Johnson

Cameron a business consultant specializing in cybersecurity and big data. Cameron has also had the opportunity to speak at international conferences and was recently recognized as one of the world’s top 100 experts to follow on social media.

Episode 1: Why Small and Medium Sized Businesses Need an MSP

Small and Medium Sized Businesses Need an MSP Small and medium-sized businesses don’t enjoy the benefits of a large IT department. What should they consider when it comes to handing over their data to a ...

Resolving IT-Finance Asynchronization on Cloud Improvements

Resolving IT-Finance Asynchronization While CIO-CFO communications and alignment may never seem better, what is considered to be C-level, strategic “alignment” increasingly obscures realities that keep IT and Finance from synchronizing their thinking and activity. This ...

Digitizing Contact Center to Reduce Call Volume by 30% and Improve NPS

Digitizing Contact Center With a Net Promoter Score (NPS) average of 24, telecom holds the lowest industry average according to the NPS Benchmarks Report. Operational inefficiencies in contact centers play a major role in the low ...

Leveraging Managed Kubernetes to Improve Your Operations

Leveraging Managed Kubernetes Kubernetes simplifies container orchestration, but sometimes companies are struggling with Kubernetes adoption. Many organizations do not have the required expertise to configure and manage Kubernetes by themselves. Managed Kubernetes is a good ...

Businesses Need E911 for Remote Employees

E911 for Remote Employees Remote working is no longer a luxury or a distant possibility – it’s the norm for enterprises around the world. The “trend” of telecommuting is not new; for example, the number ...

533 Million Facebook Users Had Their Data Stolen and Leaked Online

Facebook Data Stolen and Leaked Online On Saturday, April 3rd, a user from a hacking forum published the personal data from more than 500 million Facebook users. The hacked and published data were available at ...