-
Essay / 5 Ways to Measure the Quality of Your Cryptography
5 Ways to Measure the Quality of Your CryptographyIntroductionCryptography has definitely become a more mainstream topic today. Almost every device in this world is connected to the Internet and shares information. Along with the increase in the number of sensitive data in information shared between devices, applications and the server, the number of sensitive data is also increasing on a larger scale. This information must be protected so that sensitive data remains private. Today's dominance attack is not just about denial of services or viruses, like it was 10 or 15 years ago. Today's attack is more aimed at a specific objective like data theft, eavesdropping, access to sensitive data like credit card numbers, passwords or maybe property intellectual in a company, or the escalation of privileges as an insider wishes to gain access or higher level access. higher-level value of the data in order to discard or sell it. The number of attack services is also increasing with cloud computing or mobile devices, we have many applications on different devices. Additionally, sensitive data is located in more and more places, meaning there are more weak spots to exploit. BodyTo defend this, the principle of layered security remains a choice. It is the application that runs the business and that is why there is a good mix between traditional tools and modern technology applied in this field. When applying the security layer, people generally do so on a risk-based basis, applying the highest level of protection to the riskiest, most risky, and most valuable application. So what happens now is that the critical (or riskiest and most valuable) application performs cryptography in the form of encryption...... middle of paper ......ation so that hackers can break into the system. .After watching and listening to this seminar, my perspective on cryptography has broadened. What I learned in class and what reality is seems very different. From what I learned in class, cryptography seems very effective in terms of securing data (confidentiality) and digital signing (authentication), making it almost impossible for hackers to know the encrypted data or information . But I don't realize that the most important thing in cryptography is the key itself. Even though it seems very difficult to know and obtain the key, hackers still manage to do it. And usually hackers are insiders, because insiders usually have more information than outsiders, so it becomes clear that insiders are the most dangerous intruders.Referencesīˇ https://www.brighttalk.com /webcast/7537/111117