Tag Archives: zybert computing

IT Security Concepts

IT Security Concepts

Introduction

This document is an attempt to formulate basic reasoning behind security technologies, we should employ. It is not trying to analyse the actual techniques used and tries to stay away from technology comparisons. I apologize for some of the analogies that may sound infantile. The reason for this is two-fold: it may help to explain the concept to a non-technical reader, but also, I found that using simple analogies may sometimes expose holes in our thinking.

Why use security systems

It is quite obvious that any security system has a cost, not only in terms of cash, but also – more significantly –

Read more ...

Is he trying to put us out of business?

David Cameron is going to try and ban encryption in Britain

Read BusinessInsider article
It may be uncomfortable to suddenly be on the same side as terrorists, but we seem to be in a good company.
And writing for the Guardian, James Ball suggested that a blanket ban on encryption would “spell the end of e-commerce” in the UK since credit card details are generally always sent via secure encrypted connections. “Cameron either knows his anti-terror talk is unworkable and is looking for headlines,” Ball said, “or he hasn’t got a clue.”
Well… – guess which one…

Where to keep your sensitive data for remote working

Where to keep sensitive data

The table below summarizes security and speed implication of different ways of accessing sensitive data while working out of office. Note that the comparison only lists most popular ways of storing data and the Security/Speed correspond to typical situation – in the real world access speed and security provided by local encryption vary.

Read more ...

Snooper’s charter – here we go again!

This hydra has plenty of heads. And for each that is cut off, two more grow… http://www.theguardian.com/media-network/2015/may/27/snoopers-charter-business-public-communications-data reports on the next attempt of making this bill stick. There is very little a business can do about the external mail – encryption works for recipients who support it and is a good idea. But businesses should start thinking more carefully about their internal emails – obviously more sensitive. It may be a good time to ensure that the internal emails – including from mobile workers and mobile devices – don’t wonder around Internet where they have to be logged, preserved and disclosed to who knows whom – deliberately or by mistake.

Don’t worry we have nothing to hide, or do we?

Nothing to hide

When the government gathers or analyzes personal information, many people say they’re not worried. “I’ve got nothing to hide,” they declare. “Only if you’re doing something wrong should you worry, and then you don’t deserve to keep it private.”

Read more ...