SlideShare a Scribd company logo
1 of 26
Download to read offline
DATA BREACHES
are making headlines
There were more data breaches
in 2014 than any year on record
The average cost of a data breach is now
$3.8 MILLION
AND SNOWDEN REVEALED GOVERNMENTS
HAVE SWEEPING SURVEILLANCE POWERS
Among them, the NSA:
Taps fiber optic cables that
carry much of the world’s
Internet traffic
Collects over 200
million text messages
each day
Intercepts unencrypted
data sent between Google
and Yahoo data centers
YOUR DATA SHOULD BELONG TO THE NSAYOUR DATA SHOULD BELONG TO THE NSA
YOUR DATA SHOULD BELONG TO THE NSA
YOU
YOUR DATA SHOULD BELONG TO THE NSA
YOU
Security experts agree
is one of the best ways to protect your data
Edward Snowden
“Encryption works. Properly
implemented strong crypto
systems are one of the few
things that you can rely on.”
Millions of people
encrypt data on their computers,
but what about when they use apps?
EMAIL IS LIKE A POSTCARD
Anyone who handles
your email in transit can
read it, including your
ISP, a hacker, or the NSA
Here are some secure alternatives
Encrypted so provider
can’t read it?
Encrypted in transit?
CryptoCat Silent Text Silent Phone Signal/RedPhone ChatSecure + Orbot
Can you verify
contacts’ identities?
Are past communications
secure if keys stolen?
Is code open to
independent review?
Is security design
properly documented?
Has code been audited?
Here are some secure alternatives
Source: Electronic Frontier Foundation, ProPublica, Joseph Bonneau
And when you browse the Internet,
people can see the unencrypted
data sent to and from a website
JUST 1.9%
of the Internet’s top 1
million sites use HTTPS
encryption by default
Browser plugins like HTTPS Everywhere
can switch to encryption to thwart
surveillance and cyber criminals
Browser plugins like HTTPS Everywhere can switch to
encryption to thwart surveillance and cyber criminals
When it comes to the cloud,
of apps encrypt
data stored at rest11%
Some of the biggest names in cloud computing
don’t store customer data encrypted
1. Facebook
2. Twitter
3. YouTube
5. Linkedin
6. Gmail
7. eBay
8. Paypal
4. TubeMogul
10. AOL Mail
9. Hotmail
TOP 10MOST POPULAR
APPSthat don’t encrypt data
WHY DOES IT MATTER?
When the government seized Megaupload’s servers, they
seized all the data customers had uploaded to the service
When hackers gained access to
Slack’s core systems, they stole
unencrypted usernames, email
addresses, phone numbers, and
Skype IDs
When data is stored encrypted, it is
by any third parties who may gain access
not readable
There are many encryption options
available today
There are many encryption
options available today
But there is usually a tradeoff between the strength of the
encryption and maintaining cloud app functionality
Functionality Preserved (approximate)
EncryptionStrength(approximate)
Regular (Unstructured)
Encryption
Selective
Encryption
Searchable Encryption -
Keyword Extraction
Searchable Encryption -
Local Search Tokenization
Searchable Encryption -
Word-By-Word
Data
Tokenization
Format-Preserving
Encryption (FPE)
Order-Preserving
Encryption (OPE)
Search By Prefix
Download the Encryption Handbook
DOWNLOAD NOW
(Report Cover)
Learn more about
encryption schemes and
their relative strengths
and weaknesses.
Brought to you by
The Cloud Encryption Handbook:
Alexandra Boldyreva , Ph.D. Computer Science,
M.S., B.S. Applied Mathematics
Paul Grubbs, B.S., Mathematics, Computer Science
ENCRYPTION SCHEMES
AND THEIR RELATIVE
STRENGTHS AND
WEAKNESSES

More Related Content

Viewers also liked

11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines Skyhigh Networks
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
 
How I Hack, Hacker Facebook Account
How I Hack, Hacker Facebook AccountHow I Hack, Hacker Facebook Account
How I Hack, Hacker Facebook AccountBudi Khoirudin
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data BreachSkyhigh Networks
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 
The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaSkyhigh Networks
 
Phone security code unlock message
Phone security code unlock messagePhone security code unlock message
Phone security code unlock messageMansoor Rafeeq
 

Viewers also liked (7)

11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines 11 European Privacy Regulations That Could Cost You €1 Million in Fines
11 European Privacy Regulations That Could Cost You €1 Million in Fines
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
How I Hack, Hacker Facebook Account
How I Hack, Hacker Facebook AccountHow I Hack, Hacker Facebook Account
How I Hack, Hacker Facebook Account
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data Breach
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
The Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and SequoiaThe Cloud in 2015: Predictions from Greylock and Sequoia
The Cloud in 2015: Predictions from Greylock and Sequoia
 
Phone security code unlock message
Phone security code unlock messagePhone security code unlock message
Phone security code unlock message
 

Recently uploaded

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

How to Thwart Hackers and the NSA with Encryption

  • 1.
  • 3. There were more data breaches in 2014 than any year on record
  • 4. The average cost of a data breach is now $3.8 MILLION
  • 5. AND SNOWDEN REVEALED GOVERNMENTS HAVE SWEEPING SURVEILLANCE POWERS
  • 6. Among them, the NSA: Taps fiber optic cables that carry much of the world’s Internet traffic Collects over 200 million text messages each day Intercepts unencrypted data sent between Google and Yahoo data centers
  • 7. YOUR DATA SHOULD BELONG TO THE NSAYOUR DATA SHOULD BELONG TO THE NSA
  • 8. YOUR DATA SHOULD BELONG TO THE NSA YOU YOUR DATA SHOULD BELONG TO THE NSA YOU
  • 9. Security experts agree is one of the best ways to protect your data
  • 10. Edward Snowden “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.”
  • 11. Millions of people encrypt data on their computers, but what about when they use apps?
  • 12. EMAIL IS LIKE A POSTCARD Anyone who handles your email in transit can read it, including your ISP, a hacker, or the NSA
  • 13. Here are some secure alternatives Encrypted so provider can’t read it? Encrypted in transit? CryptoCat Silent Text Silent Phone Signal/RedPhone ChatSecure + Orbot Can you verify contacts’ identities? Are past communications secure if keys stolen? Is code open to independent review? Is security design properly documented? Has code been audited? Here are some secure alternatives Source: Electronic Frontier Foundation, ProPublica, Joseph Bonneau
  • 14. And when you browse the Internet, people can see the unencrypted data sent to and from a website
  • 15. JUST 1.9% of the Internet’s top 1 million sites use HTTPS encryption by default
  • 16. Browser plugins like HTTPS Everywhere can switch to encryption to thwart surveillance and cyber criminals Browser plugins like HTTPS Everywhere can switch to encryption to thwart surveillance and cyber criminals
  • 17. When it comes to the cloud, of apps encrypt data stored at rest11%
  • 18. Some of the biggest names in cloud computing don’t store customer data encrypted
  • 19. 1. Facebook 2. Twitter 3. YouTube 5. Linkedin 6. Gmail 7. eBay 8. Paypal 4. TubeMogul 10. AOL Mail 9. Hotmail TOP 10MOST POPULAR APPSthat don’t encrypt data
  • 20. WHY DOES IT MATTER?
  • 21. When the government seized Megaupload’s servers, they seized all the data customers had uploaded to the service
  • 22. When hackers gained access to Slack’s core systems, they stole unencrypted usernames, email addresses, phone numbers, and Skype IDs
  • 23. When data is stored encrypted, it is by any third parties who may gain access not readable
  • 24. There are many encryption options available today There are many encryption options available today
  • 25. But there is usually a tradeoff between the strength of the encryption and maintaining cloud app functionality Functionality Preserved (approximate) EncryptionStrength(approximate) Regular (Unstructured) Encryption Selective Encryption Searchable Encryption - Keyword Extraction Searchable Encryption - Local Search Tokenization Searchable Encryption - Word-By-Word Data Tokenization Format-Preserving Encryption (FPE) Order-Preserving Encryption (OPE) Search By Prefix
  • 26. Download the Encryption Handbook DOWNLOAD NOW (Report Cover) Learn more about encryption schemes and their relative strengths and weaknesses. Brought to you by The Cloud Encryption Handbook: Alexandra Boldyreva , Ph.D. Computer Science, M.S., B.S. Applied Mathematics Paul Grubbs, B.S., Mathematics, Computer Science ENCRYPTION SCHEMES AND THEIR RELATIVE STRENGTHS AND WEAKNESSES