Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

How to Thwart Hackers and the NSA with Encryption

58,159 views

Published on

Published in: Technology
  • Nice !! Download 100 % Free Ebooks, PPts, Study Notes, Novels, etc @ https://www.ThesisScientist.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Hello! Get Your Professional Job-Winning Resume Here - Check our website! https://vk.cc/818RFv
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Hey guys!!! I got 5,500 USD Every Day In 6 Months See How It Works Do You Know You Can Hack Into Any ATM Machine With A Hacked ATM card. Order For A Blank ATM Card Now And Get Millions Within A Week Contact Via Email: medihacks@gmail.com We Have Specially Programmed ATM Cards That Can Be Used To Hack ATM Machines,The ATM Cards Can Be Used To Withdraw At The Atm Or Swipe At The Stores And POS,Will Sell This Card To All Our Customer And Interested Buyers Worlwide..The Card Has A Daily Limit Of 5,500 USD On ATM And Up to 50,000USD Spending Limit In Stores Depending On The Kind Of Card You Order For...And Moreover For All Other Hacking Services Contact Us. Here Is Our Price List For The ATM CARDS Cards That Withdraw 5,500USD Per Day Cost 850USD Card That Withdraw 10,000USD Per Day Cost 2,000USD Cards That Withdraw 35,000USD Per Day Cost 3,500 USD Cards That Withdraw 50,000USD Per Day Cost 6,000USD Card That Withdraw 100,000USD Per Day Cost 10,000USD. NOTE:PRICES INCLUDE SHIPPING FEES AND CHARGES,CONTACT NOW VIA EMAIL: medihacks@gmail.com I Vouch For Hacker John Anytime Any Day His Service's Are Legit..I Bet You Gonna Thank Me Later.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • like :)
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Good presentation however. On the 10th Slide just FYI Edward Snowden was not the first person to say that exact quote, an old crypto engineer was, I've seen it in a book before long before snowden.
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

How to Thwart Hackers and the NSA with Encryption

  1. DATA BREACHES are making headlines
  2. There were more data breaches in 2014 than any year on record
  3. The average cost of a data breach is now $3.8 MILLION
  4. AND SNOWDEN REVEALED GOVERNMENTS HAVE SWEEPING SURVEILLANCE POWERS
  5. Among them, the NSA: Taps fiber optic cables that carry much of the world’s Internet traffic Collects over 200 million text messages each day Intercepts unencrypted data sent between Google and Yahoo data centers
  6. YOUR DATA SHOULD BELONG TO THE NSAYOUR DATA SHOULD BELONG TO THE NSA
  7. YOUR DATA SHOULD BELONG TO THE NSA YOU YOUR DATA SHOULD BELONG TO THE NSA YOU
  8. Security experts agree is one of the best ways to protect your data
  9. Edward Snowden “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.”
  10. Millions of people encrypt data on their computers, but what about when they use apps?
  11. EMAIL IS LIKE A POSTCARD Anyone who handles your email in transit can read it, including your ISP, a hacker, or the NSA
  12. Here are some secure alternatives Encrypted so provider can’t read it? Encrypted in transit? CryptoCat Silent Text Silent Phone Signal/RedPhone ChatSecure + Orbot Can you verify contacts’ identities? Are past communications secure if keys stolen? Is code open to independent review? Is security design properly documented? Has code been audited? Here are some secure alternatives Source: Electronic Frontier Foundation, ProPublica, Joseph Bonneau
  13. And when you browse the Internet, people can see the unencrypted data sent to and from a website
  14. JUST 1.9% of the Internet’s top 1 million sites use HTTPS encryption by default
  15. Browser plugins like HTTPS Everywhere can switch to encryption to thwart surveillance and cyber criminals Browser plugins like HTTPS Everywhere can switch to encryption to thwart surveillance and cyber criminals
  16. When it comes to the cloud, of apps encrypt data stored at rest11%
  17. Some of the biggest names in cloud computing don’t store customer data encrypted
  18. 1. Facebook 2. Twitter 3. YouTube 5. Linkedin 6. Gmail 7. eBay 8. Paypal 4. TubeMogul 10. AOL Mail 9. Hotmail TOP 10MOST POPULAR APPSthat don’t encrypt data
  19. WHY DOES IT MATTER?
  20. When the government seized Megaupload’s servers, they seized all the data customers had uploaded to the service
  21. When hackers gained access to Slack’s core systems, they stole unencrypted usernames, email addresses, phone numbers, and Skype IDs
  22. When data is stored encrypted, it is by any third parties who may gain access not readable
  23. There are many encryption options available today There are many encryption options available today
  24. But there is usually a tradeoff between the strength of the encryption and maintaining cloud app functionality Functionality Preserved (approximate) EncryptionStrength(approximate) Regular (Unstructured) Encryption Selective Encryption Searchable Encryption - Keyword Extraction Searchable Encryption - Local Search Tokenization Searchable Encryption - Word-By-Word Data Tokenization Format-Preserving Encryption (FPE) Order-Preserving Encryption (OPE) Search By Prefix
  25. Download the Encryption Handbook DOWNLOAD NOW (Report Cover) Learn more about encryption schemes and their relative strengths and weaknesses. Brought to you by The Cloud Encryption Handbook: Alexandra Boldyreva , Ph.D. Computer Science, M.S., B.S. Applied Mathematics Paul Grubbs, B.S., Mathematics, Computer Science ENCRYPTION SCHEMES AND THEIR RELATIVE STRENGTHS AND WEAKNESSES

×