Secure and Green<br />Budi Rahardjo<br />budi@indocisc.com<br />
Security<br />Goals<br />Confidentiality<br />Integrity<br />Availability<br />How to<br />Encryption<br />Message Authent...
Encryption for Confidentiality<br />Must deliver encrypted data as soon as possible<br />Current encryption algorithms (RS...
More on encryption<br />Must be difficult to break (eg. via brute force attack)<br />“Easier” to use (calculate), but it i...
Green Encryption<br />Must find algorithm that requires less computation to use (but still difficult to attack)<br />Reuse...
Integrity<br />Message Authentication Code (MAC) ensures that one bit change in data produces (significantly) different si...
Availability<br />Implemented through redundancy <br />not so green <br />Alternative solution<br />Shared backup / redun...
Virtual Servers<br />Virtualization, virtual servers, combining several applications into one physical server<br />Use les...
Incident Handling<br />How to make more green<br />Centralized unified threat management (use less servers for logging and...
Final Remarks<br />Still difficult to achieve secure and green<br />2010<br />10<br />BR - Secure and Green<br />
Upcoming SlideShare
Loading in …5
×

Secure And Green

879 views

Published on

Presentation at Green ICT

Published in: Technology
2 Comments
0 Likes
Statistics
Notes
  • correction: have never thought of security in terms of green. komen tidak bisa di edit, kejaaaam :)
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • nice presentation :) have never think of security in terms of 'green' :D
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
879
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
28
Comments
2
Likes
0
Embeds 0
No embeds

No notes for slide

Secure And Green

  1. 1. Secure and Green<br />Budi Rahardjo<br />budi@indocisc.com<br />
  2. 2. Security<br />Goals<br />Confidentiality<br />Integrity<br />Availability<br />How to<br />Encryption<br />Message Authentication Code, hash function<br />Redundancy<br />2010<br />2<br />BR - Secure and Green<br />
  3. 3. Encryption for Confidentiality<br />Must deliver encrypted data as soon as possible<br />Current encryption algorithms (RSA, ECC) are computationally expensive<br />Uses more energy! Not so green<br />2010<br />3<br />BR - Secure and Green<br />
  4. 4. More on encryption<br />Must be difficult to break (eg. via brute force attack)<br />“Easier” to use (calculate), but it is still expensive in terms of computational resource usage<br />Thus, high performance computing<br />2010<br />BR - Secure and Green<br />4<br />
  5. 5. Green Encryption<br />Must find algorithm that requires less computation to use (but still difficult to attack)<br />Reuse available blocks<br />2010<br />5<br />BR - Secure and Green<br />
  6. 6. Integrity<br />Message Authentication Code (MAC) ensures that one bit change in data produces (significantly) different signature<br />Implemented with hash function<br />Hash function (relatively) computationally inexpensive<br />Maybe green?<br />2010<br />6<br />BR - Secure and Green<br />
  7. 7. Availability<br />Implemented through redundancy <br />not so green <br />Alternative solution<br />Shared backup / redundant servers through virtualization?<br />2010<br />7<br />BR - Secure and Green<br />
  8. 8. Virtual Servers<br />Virtualization, virtual servers, combining several applications into one physical server<br />Use less physical resources, thus green<br />But, … it is more difficult to manage in terms of security<br />[how about cloud computing?]<br />2010<br />8<br />BR - Secure and Green<br />
  9. 9. Incident Handling<br />How to make more green<br />Centralized unified threat management (use less servers for logging and analysis)<br />Remote forensic<br />Things that can be done remotely<br />At the last step, bring forensic team (if needed)<br />2010<br />9<br />BR - Secure and Green<br />
  10. 10. Final Remarks<br />Still difficult to achieve secure and green<br />2010<br />10<br />BR - Secure and Green<br />

×