SlideShare une entreprise Scribd logo
1  sur  27
Data-in-Motion
and
Data-at-Rest
ANKIT P. MEHTA
Main Topics
 Data-in-Motion
 Data-at-Rest
 GnuPG
Data-in-Motion
INTRODUCTION TO DATA-IN-MOTION
ADVANTAGES OF DATA-IN-MOTION
ATTACKS ON DATA-IN-MOTION
PREVENTION OF DATA-IN-MOTION
Introduction to Data-in-Motion
 Data in motion is data that is being transmitted over a network
 Data as it is in transit
 Data that is exiting the network via email, web, or other Internet
protocols
 Data being manipulated by an application
 The collection process for data in motion is similar to that of data at
rest; however, the difference lies in the analytics. In this case, the
analytics occur in real-time as the event happens.
Introduction to Data-in-Motion
 What can be called Data-in-Motion ?
o Sending an e-mail
o Backing up your laptop data to a central server
o Uploading or downloading files to file-hosting sites
o When connecting/logging into your on-line e-mail account--such as
gmail--at Starbucks; etc.
Advantages of Data-In-Motion
 Data in Motion represents a compelling opportunity for
organizations in a variety of industries that rely on extracting value
from data before it is stored, including:
o Retail
o Healthcare
o Manufacturing
o Energy production
o Service provider market sectors
o Internet of Things
Attacks on Data-in-Motion
 The biggest threats to data in motion are interception and alteration
 Vulnerable to attackers because the attacker does not have to be
near the computer in which the data is being stored rather they only
have to be somewhere along the path
Preventive Measures for those
Attacks
 Encrypting the network session ensures a higher security level for
data in motion
 Encryption tunnels can protect data along the path of
communications
 Virtual Private Networks (VPN)
 Secure Shell (SSH)
 Advanced Encryption Standard (AES)
 Use mechanisms such as Secure Socket Layer (SSL) to encrypt
messages
 Use Gnu Privacy Guard (GnuPG) for encrypting messages
Data-at-Rest
INTRODUCTION TO DATA-AT-REST
ATTACKS ON DATA-AT-REST
VARIOUS PREVENTIVE MECHANISMS
Introduction to Data-at-Rest
 Refers to data that has been collected from various sources and is
then analysed after the event occurs
 Data stored in persistent storage
 Definition:
 All data in storage or that which resides in temporary memory. Data at
rest is not limited to archived data, data which is not accessed or
changed frequently, files stored on hard drives, USB thumb drives, files
stored on backup tape and disks, and also files stored off-site or on a
storage area network (SAN).
Attacks on Data-at-Rest
 Because of its nature Data at Rest is of increasing concern to
businesses, government agencies and other institutions.
 Mobile devices are often subject to specific security protocols to
protect Data at Rest from unauthorised access when lost or stolen.
 There is an increasing recognition that database management
systems and file servers should also be considered as at risk.
 The longer data is left unused in storage, the more likely it might be
retrieved by unauthorized individuals outside the network.
Various Prevention Mechanisms
 The encryption of data at rest should only include strong encryption
methods such as AES, RSA, and SHA-256
 Cryptography can be implemented on the database housing the
data and on the physical storage the databases are stored.
 Data encryption keys should be updated on a regular basis.
 Encryption keys should be stored separately from the data.
 Periodic auditing of sensitive data should be part of policy and
should occur on scheduled occurrences.
 Only store the minimum amount of sensitive data as possible.
Gnu Privacy Guard
INTRODUCTION TO GPG
FEATURES OF GPG
GPG ALGORITHMS
CONCEPT OF KEY RINGS
GPG KEY EXCHANGE AND USAGE
GPG CERTIFICATES
WORKING (HANDS-ON)
Introduction to GPG
 GPG stands for “Gnu Privacy Guard”
 Free implementation of Open PGP
 GnuPG allows to encrypt and sign our data and communication
 It features a versatile key management system as well as access
modules for all kinds of public key directories.
 Source Code is available
 Free of cost
Features of GPG
 Does not use any patented algorithms
 Full OpenPGP implementation
 Supports Key and signature expiration dates
 Available in multiple languages
 Online Help System
 Supports algorithms such as DSA, RSA, AES, 3DES, Blowfish, Twofish,
MD5, SHA-1, TIGER and CAST5
GPG Algorithms
Algorithm Type Description
Asymmetric Key RSA , DSS
Message Digest MD5, SHA-1, RIPE-MD
Encryption IDEA, DES-3, AES
Concept of Key Rings
 GPG specifies a ring of public-private keys.
 A user may want to change his public-private key pair or may want
to use a different key pair for different recipients or group of
recipients.
 Every GPG user needs to have two sets of keys rings:
 A ring for his own public-private key pairs
 A ring for the public keys of other users
GPG Key Exchange and Usage
 Sender’s side:
 Sender creates a message digest of the original message and encrypts
it using his private key from one of the key in the “Key Ring”.
 Sender creates a one-time symmetric key.
 Sender uses the public key (by looking in the public Key Ring) of the
intended recipient to encrypt the one-time symmetric key created.
Usually RSA algorithm is used for this.
 Sender encrypts the Digital Signature with the one-time symmetric key.
 Sender sends the encrypted original message and digital signature to
the receiver.
GPG Key Exchange and Usage
 Receiver’s side:
 Receiver uses his private key to obtain the one-time symmetric key
created by the sender.
 Receiver uses the one-time key to decrypt the message.
 Receiver computes a message digest of the original message.(say MD1)
 Receiver uses the one-time key to obtain original digital signature.
 Receiver uses the sender’s public key from the Key Ring to decrypt the
digital signature and gets back the original message digest.(say MD2)
 Receiver compares message digest MD1 and MD2. If they match,
receiver is sure about the message integrity and authentication of the
message sender.
GPG Certificates
 GPG can use certificates issued by Certification Authority or can use
its own certificate system.
 In GPG, there is no CA.
 This creates a situation where a user can have certificates issued by
different users.
 “Introducer” acts as a CA in GPG.
 Concept of:
 Introducer Trust
 Certificate Trust
 Key Legitimacy
 Web of Trust
Setup Screenshots
Thank You
ANY QUESTIONS?

Contenu connexe

Tendances

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Security models
Security models Security models
Security models LJ PROJECTS
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
6. cryptography
6. cryptography6. cryptography
6. cryptography7wounders
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems Cleverence Kombe
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithmSunita Kharayat
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment modelsAshok Kumar
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesMdFazleRabbi18
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptographyPrabhat Goel
 

Tendances (20)

Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Cryptography
CryptographyCryptography
Cryptography
 
DDBMS Paper with Solution
DDBMS Paper with SolutionDDBMS Paper with Solution
DDBMS Paper with Solution
 
Security models
Security models Security models
Security models
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Intrusion Detection Systems and Intrusion Prevention Systems
Intrusion Detection Systems  and Intrusion Prevention Systems Intrusion Detection Systems  and Intrusion Prevention Systems
Intrusion Detection Systems and Intrusion Prevention Systems
 
Email security
Email securityEmail security
Email security
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Cloud deployment models
Cloud deployment modelsCloud deployment models
Cloud deployment models
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
OSI Layer Security
OSI Layer SecurityOSI Layer Security
OSI Layer Security
 
Secret key cryptography
Secret key cryptographySecret key cryptography
Secret key cryptography
 

Similaire à Data-in-Motion, Data-At-Rest and GPG

Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementStuart Marsh
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryptionRuban Deventhiran
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)Rohit malav
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...IGEEKS TECHNOLOGIES
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET Journal
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowBrijesh Vishwakarma
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptxkarthikvcyber
 
ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010James Cheng
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 

Similaire à Data-in-Motion, Data-At-Rest and GPG (20)

Protecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key ManagementProtecting Sensitive Data using Encryption and Key Management
Protecting Sensitive Data using Encryption and Key Management
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Atm Security System Using Steganography Nss ptt by (rohit malav)
Atm Security System Using  Steganography Nss ptt by (rohit malav)Atm Security System Using  Steganography Nss ptt by (rohit malav)
Atm Security System Using Steganography Nss ptt by (rohit malav)
 
Encryption in Cryptography
Encryption in CryptographyEncryption in Cryptography
Encryption in Cryptography
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
Secrity project keyvan
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...Access control in decentralized online social networks applying a policy hidi...
Access control in decentralized online social networks applying a policy hidi...
 
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...IRJET-  	  Secure Sharing of Personal Data on Cloud using Key Aggregation and...
IRJET- Secure Sharing of Personal Data on Cloud using Key Aggregation and...
 
Encryption Primer por Cathy Nolan
Encryption Primer por Cathy NolanEncryption Primer por Cathy Nolan
Encryption Primer por Cathy Nolan
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
V5 i7 0169
V5 i7 0169V5 i7 0169
V5 i7 0169
 
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYA NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHY
 
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
 
Cn ppt
Cn pptCn ppt
Cn ppt
 
Security technology
Security technologySecurity technology
Security technology
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
cryptography-Final.pptx
cryptography-Final.pptxcryptography-Final.pptx
cryptography-Final.pptx
 
ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010ITOX PGP CommandLine slide_share march 2010
ITOX PGP CommandLine slide_share march 2010
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 

Dernier

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 

Dernier (20)

Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 

Data-in-Motion, Data-At-Rest and GPG

  • 2. Main Topics  Data-in-Motion  Data-at-Rest  GnuPG
  • 3. Data-in-Motion INTRODUCTION TO DATA-IN-MOTION ADVANTAGES OF DATA-IN-MOTION ATTACKS ON DATA-IN-MOTION PREVENTION OF DATA-IN-MOTION
  • 4. Introduction to Data-in-Motion  Data in motion is data that is being transmitted over a network  Data as it is in transit  Data that is exiting the network via email, web, or other Internet protocols  Data being manipulated by an application  The collection process for data in motion is similar to that of data at rest; however, the difference lies in the analytics. In this case, the analytics occur in real-time as the event happens.
  • 5. Introduction to Data-in-Motion  What can be called Data-in-Motion ? o Sending an e-mail o Backing up your laptop data to a central server o Uploading or downloading files to file-hosting sites o When connecting/logging into your on-line e-mail account--such as gmail--at Starbucks; etc.
  • 6. Advantages of Data-In-Motion  Data in Motion represents a compelling opportunity for organizations in a variety of industries that rely on extracting value from data before it is stored, including: o Retail o Healthcare o Manufacturing o Energy production o Service provider market sectors o Internet of Things
  • 7. Attacks on Data-in-Motion  The biggest threats to data in motion are interception and alteration  Vulnerable to attackers because the attacker does not have to be near the computer in which the data is being stored rather they only have to be somewhere along the path
  • 8. Preventive Measures for those Attacks  Encrypting the network session ensures a higher security level for data in motion  Encryption tunnels can protect data along the path of communications  Virtual Private Networks (VPN)  Secure Shell (SSH)  Advanced Encryption Standard (AES)  Use mechanisms such as Secure Socket Layer (SSL) to encrypt messages  Use Gnu Privacy Guard (GnuPG) for encrypting messages
  • 9. Data-at-Rest INTRODUCTION TO DATA-AT-REST ATTACKS ON DATA-AT-REST VARIOUS PREVENTIVE MECHANISMS
  • 10. Introduction to Data-at-Rest  Refers to data that has been collected from various sources and is then analysed after the event occurs  Data stored in persistent storage  Definition:  All data in storage or that which resides in temporary memory. Data at rest is not limited to archived data, data which is not accessed or changed frequently, files stored on hard drives, USB thumb drives, files stored on backup tape and disks, and also files stored off-site or on a storage area network (SAN).
  • 11. Attacks on Data-at-Rest  Because of its nature Data at Rest is of increasing concern to businesses, government agencies and other institutions.  Mobile devices are often subject to specific security protocols to protect Data at Rest from unauthorised access when lost or stolen.  There is an increasing recognition that database management systems and file servers should also be considered as at risk.  The longer data is left unused in storage, the more likely it might be retrieved by unauthorized individuals outside the network.
  • 12. Various Prevention Mechanisms  The encryption of data at rest should only include strong encryption methods such as AES, RSA, and SHA-256  Cryptography can be implemented on the database housing the data and on the physical storage the databases are stored.  Data encryption keys should be updated on a regular basis.  Encryption keys should be stored separately from the data.  Periodic auditing of sensitive data should be part of policy and should occur on scheduled occurrences.  Only store the minimum amount of sensitive data as possible.
  • 13. Gnu Privacy Guard INTRODUCTION TO GPG FEATURES OF GPG GPG ALGORITHMS CONCEPT OF KEY RINGS GPG KEY EXCHANGE AND USAGE GPG CERTIFICATES WORKING (HANDS-ON)
  • 14. Introduction to GPG  GPG stands for “Gnu Privacy Guard”  Free implementation of Open PGP  GnuPG allows to encrypt and sign our data and communication  It features a versatile key management system as well as access modules for all kinds of public key directories.  Source Code is available  Free of cost
  • 15. Features of GPG  Does not use any patented algorithms  Full OpenPGP implementation  Supports Key and signature expiration dates  Available in multiple languages  Online Help System  Supports algorithms such as DSA, RSA, AES, 3DES, Blowfish, Twofish, MD5, SHA-1, TIGER and CAST5
  • 16. GPG Algorithms Algorithm Type Description Asymmetric Key RSA , DSS Message Digest MD5, SHA-1, RIPE-MD Encryption IDEA, DES-3, AES
  • 17. Concept of Key Rings  GPG specifies a ring of public-private keys.  A user may want to change his public-private key pair or may want to use a different key pair for different recipients or group of recipients.  Every GPG user needs to have two sets of keys rings:  A ring for his own public-private key pairs  A ring for the public keys of other users
  • 18. GPG Key Exchange and Usage  Sender’s side:  Sender creates a message digest of the original message and encrypts it using his private key from one of the key in the “Key Ring”.  Sender creates a one-time symmetric key.  Sender uses the public key (by looking in the public Key Ring) of the intended recipient to encrypt the one-time symmetric key created. Usually RSA algorithm is used for this.  Sender encrypts the Digital Signature with the one-time symmetric key.  Sender sends the encrypted original message and digital signature to the receiver.
  • 19. GPG Key Exchange and Usage  Receiver’s side:  Receiver uses his private key to obtain the one-time symmetric key created by the sender.  Receiver uses the one-time key to decrypt the message.  Receiver computes a message digest of the original message.(say MD1)  Receiver uses the one-time key to obtain original digital signature.  Receiver uses the sender’s public key from the Key Ring to decrypt the digital signature and gets back the original message digest.(say MD2)  Receiver compares message digest MD1 and MD2. If they match, receiver is sure about the message integrity and authentication of the message sender.
  • 20. GPG Certificates  GPG can use certificates issued by Certification Authority or can use its own certificate system.  In GPG, there is no CA.  This creates a situation where a user can have certificates issued by different users.  “Introducer” acts as a CA in GPG.  Concept of:  Introducer Trust  Certificate Trust  Key Legitimacy  Web of Trust
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.