2. What is encryption?
A process that converts original information, also
called plain text into a difficult-to-interpret form
called ciphertext.
Done by using an encryption algorithm, a formula
used to turn plain text into ciphertext.
Two types: Asymmetric and Symmetric
5. Which one is better?
Although, symmetric encryption is fast, it is not as
safe as asymmetric encryption because someone
could “steal” the key and decode the messages.
But because of its speed, it's commonly used for e-
commerce transactions.
Asymmetric encryption is more complex--and more
secure. Asymmetric encryption's added safety
comes at a price: More computation is required, so
the process takes longer.
6. Who’s using encryption?
If you use a computer and the internet, you’re
using encryption!
Enables all organizations regardless of their size, to
be both user-and-IT friendly.
7. Why use encryption?
Authentication
Protects personal data such as passwords.
Privacy
Provides for confidentiality of private information.
Accountability
Prevents denial or plagiarism.
Integrity
Ensures that a document or file has not been altered.
8. How do you manage encryption?
Make sure the encryption system has a complete
key management application.
This will help manage and protect the data and keys,
and help you safely match encrypted data with the
right key.
9. Examples of Encryption
Web browser encryption
Email encryption
Hard drive encryption
Operating system protection
10. A few vendors and their product
coverage
Blackberry
System, software, hardware, and service.
Global Technologies Group, Inc. (GTGI)
Software and hardware.
Hewlett-Packard Company
System, software, hardware, and service.
Intellect Security Ltd.
Software
11. How prevalent is it?
According to InformationWeek Research:
Of 500 sites surveyed, two-thirds report using
encryption to protect company data.
Of 500 companies surveyed, 43% use encryption on
both stored and transmitted data. More than three out
of five companies encrypt due to the threat of
outsiders intercepting sensitive data.
Continued…
12. Of 28% of sites surveyed, government regulation
requires encryption of stored and transmitted data.
For 38% of companies, the complexity of the
technology is an obstacle.
Some businesses aren’t able to use the technology
because of the lack of skilled IT personnel and budget
limitations.
13. Want more???
More on what encryption is…
http://cplus.about.com/od/introductiontoprogramming/p/encryption.htm
http://www.pcworld.com/article/id,15230/article.html
http://www.encyclopedia.com/doc/1G1-144388099.html
http://www.informationweek.com/news/showArticle.jhtml?articleID=650
7540
http://security.homeoffice.gov.uk/ripa/encryption/types-of-encryption/
http://www.itworld.com/nl/unix_sec/01242002/
http://www.pcmag.com/encyclopedia_term/0,2542,t=encryption+algorit
hm&i=42595,00.asp
More on vendors and more detailed products…
http://securitypark.bitpipe.com/olist/Data-Encryption.html