Among them, theNSA:
Taps fiber optic cables that
carry much of the world’s
Internet traffic
Collects over 200
million text messages
each day
Intercepts unencrypted
data sent between Google
and Yahoo data centers
7.
YOUR DATA SHOULDBELONG TO THE NSAYOUR DATA SHOULD BELONG TO THE NSA
8.
YOUR DATA SHOULDBELONG TO THE NSA
YOU
YOUR DATA SHOULD BELONG TO THE NSA
YOU
EMAIL IS LIKEA POSTCARD
Anyone who handles
your email in transit can
read it, including your
ISP, a hacker, or the NSA
13.
Here are somesecure alternatives
Encrypted so provider
can’t read it?
Encrypted in transit?
CryptoCat Silent Text Silent Phone Signal/RedPhone ChatSecure + Orbot
Can you verify
contacts’ identities?
Are past communications
secure if keys stolen?
Is code open to
independent review?
Is security design
properly documented?
Has code been audited?
Here are some secure alternatives
Source: Electronic Frontier Foundation, ProPublica, Joseph Bonneau
14.
And when youbrowse the Internet,
people can see the unencrypted
data sent to and from a website
15.
JUST 1.9%
of theInternet’s top 1
million sites use HTTPS
encryption by default
16.
Browser plugins likeHTTPS Everywhere
can switch to encryption to thwart
surveillance and cyber criminals
Browser plugins like HTTPS Everywhere can switch to
encryption to thwart surveillance and cyber criminals
17.
When it comesto the cloud,
of apps encrypt
data stored at rest11%
18.
Some of thebiggest names in cloud computing
don’t store customer data encrypted
19.
1. Facebook
2. Twitter
3.YouTube
5. Linkedin
6. Gmail
7. eBay
8. Paypal
4. TubeMogul
10. AOL Mail
9. Hotmail
TOP 10MOST POPULAR
APPSthat don’t encrypt data
When the governmentseized Megaupload’s servers, they
seized all the data customers had uploaded to the service
22.
When hackers gainedaccess to
Slack’s core systems, they stole
unencrypted usernames, email
addresses, phone numbers, and
Skype IDs
23.
When data isstored encrypted, it is
by any third parties who may gain access
not readable
24.
There are manyencryption options
available today
There are many encryption
options available today
25.
But there isusually a tradeoff between the strength of the
encryption and maintaining cloud app functionality
Functionality Preserved (approximate)
EncryptionStrength(approximate)
Regular (Unstructured)
Encryption
Selective
Encryption
Searchable Encryption -
Keyword Extraction
Searchable Encryption -
Local Search Tokenization
Searchable Encryption -
Word-By-Word
Data
Tokenization
Format-Preserving
Encryption (FPE)
Order-Preserving
Encryption (OPE)
Search By Prefix
26.
Download the EncryptionHandbook
DOWNLOAD NOW
(Report Cover)
Learn more about
encryption schemes and
their relative strengths
and weaknesses.
Brought to you by
The Cloud Encryption Handbook:
Alexandra Boldyreva , Ph.D. Computer Science,
M.S., B.S. Applied Mathematics
Paul Grubbs, B.S., Mathematics, Computer Science
ENCRYPTION SCHEMES
AND THEIR RELATIVE
STRENGTHS AND
WEAKNESSES