preview

Information Security

Better Essays

Recent breaches of Personal Identifiable Information (PII) highlight the failure of technical mitigation to prevent external threats. Whenever you send personal information across the internet, be it passwords, credit card information or personal contact details, encryption stops others from seeing what you are doing. Data is jumbled up in a manner so that when it travels through the internet it is completely unreadable, this stops hackers who may intercept the data from seeing what you’re doing. Cryptography is the process which meres words with letter, numbers and images to be viewed by the public, while not revealing the meaning of the message. Once a message has been encrypted it is secure to transmit or to remain at rest. The …show more content…

The first phase is data in motion, which is data being transmitted over a network, generated, updated, erased, or viewed. Next, data at rest, ie… data storage area, tablets, laptops or on desktops, mobile phones, and Iot devices.
Each presents unique challenges. And each may have different tools and methodologies that can be used to secure it.
Data in motion, as stated earlier, is literally data streaming from one place to another and can use many different types of networks to include the internet or email. Since a network contains many nodes where different clients are connected to the same network.
The most common method of protecting data in motion is the use of a secure sockets layer virtual private network (SSL VPN). Technologies such as SSL VPN are critical in the effort to protect against man-in-the-middle attacks and packet sniffers. (this is an entire paper by itself).
Encryption types for data-at-rest include the following:
Full Disk Encryption (FDE) for endpoint protection
Full Disk Encryption with Pre-Boot Authentication (FDE w/ PBA) for endpoint protection
Hardware Security Module (HSM) for key management lifecycle protection
Encrypting File System (EFS) for storage protection
Virtual Encryption for storage protection
File and Folder Encryption (FFE) for unstructured data protection
Database Encryption for structured data protection Data-in-use is the hardest to protect, it has to be decrypted and therefore exposed in order

Get Access