#EncryptionMonday

Cyber-Defence Campuscydcampus@infosec.exchange
2024-03-04

Belinda MΓΌller, Emerging Technologies Consultant at Eraneos Switzerland, is an author of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about Hashtag#Authentication.

πŸ‘©πŸΌβ€πŸ’» Authentication verifies an entity's identity using one or more factors (something they are, have, or know).

πŸ” The authentication process can be single-factor, two-factor, or multifactor, balancing security, usability, cost, and privacy.

πŸ›‘ Trends towards more secure and user-friendly authentication also bring new privacy challenges that need addressing.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Authentication
#DataProtection #EncryptionTechnologies #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2024-02-05

πŸ”’ Encryption Monday πŸ”’

Weyde Lin , COO and Co-Founder of qCella, is an author of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Tunneling and #VPN.

Tunneling involves encapsulating data packets within another packet to transport them over a network, especially when the original protocol is not supported by the host network.

While tunneling is a critical part of many VPNs, they are not the same; some VPNs do not use tunneling.

Tunneling is essential for securing remote resources, as it creates encrypted tunnels to protect against malicious interception.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Tunneling #VPN
#DataProtection #EncryptionTechnologies #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2024-01-29

πŸ”’ Encryption Monday πŸ”’

Emilia Nunes, Senior Consultant at Eraneos Switzerland, is an author of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Email #Security.

πŸ“¨ Emails are vulnerable to cyber-attacks, especially phishing, due to their original design lacking cyber-attack protection.

πŸ›‘ Cryptographic measures like end-to-end encryption and Transport Layer Security can enhance email security in transit and at rest.

πŸ”’ However, emails may never be fully secure compared to new solutions designed with robust end-to-end encryption and architecture.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #EmailSecurity
#DataProtection #EncryptionTechnologies #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2024-01-22

πŸ”’ Encryption Monday πŸ”’

Sophia Ding, Emilia Nunes, Pascal Bettendorff and Weyde Lin are author of our study on Trends in Data Protection and Encryption Technologies. Together they wrote a chapter about #Biometrics.

☝🏼 Biometrics uses physiological characteristics like fingerprints and facial features for identification, often as a second-factor authentication method.

πŸ‘©β€πŸ’» Integrated biometric solutions align hardware, key generation, validation, and storage for a coherent control environment.

πŸ”’ The increasing prevalence of biometrics, especially when combined with AI systems, raises ethical and regulatory concerns.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Biometrics
#DataProtection #EncryptionTechnologies #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2024-01-15

πŸ”’ Encryption Monday πŸ”’

Christian Cachin, professor of computer science at the University of Bern, is an author of our study on Trends in Data Protection and Encryption Technologies. He wrote a chapter about #Multi-party Threshold Cryptography

πŸ” Threshold cryptosystems distribute a private key among multiple parties using secure secret sharing, requiring cooperation of a majority for cryptographic operations.

πŸ‘©β€πŸ’» The field anticipates the emergence of standards and open-source implementations due to efforts from governmental and private sectors.

πŸ”’ It plays a crucial role in building secure distributed systems that can withstand partial component corruption.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #ThresholdCryptography #DataProtection #EncryptionTechnologies #CyberSecurity #Cryptography

Cyber-Defence Campuscydcampus@infosec.exchange
2024-01-08

πŸ”’ Encryption Monday πŸ”’

Alexander Glavackij and Sarah Ismail, former interns at the Cyber-Defence Campus and Dimitri Percia David, Professor of Data Science & Econometrics at the HES-SO Valais-Wallis are authors of our study on Trends in Data Protection and Encryption Technologies. They wrote a chapter about #Scientometric and Wikipedia Pageview Analysis.

πŸ“ˆ The analysis of data protection and encryption technologies is challenging due to rapid technological developments and varying readiness levels.

πŸ’‘ Scientometric analysis of scientific works and Wikipedia pageviews were used to gauge community and public interest in these technologies.

πŸ”’ This approach provides insights into the development and impact of data protection and encryption technologies.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Scientometric #DataProtection #EncryptionTechnologies #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-12-11

πŸ”’ Encryption Monday πŸ”’

Emilia Nunes, Senior Consultant at Eraneos Switzerland, is an author of our study on Trends in Data Protection and Encryption Technologies. They wrote a chapter about #Secure Messaging.

πŸ”‘ Secure messaging systems, featuring end-to-end encryption, protect the privacy and authenticity of communications for individuals and organizations.

πŸ“ˆ Growth in this field is driven by cloud-based and blockchain-based platforms.

πŸ”’ Persistent risks include phishing and cyberattacks, which continue to target messaging systems.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #SecureMessaging #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-12-04

πŸ”’ Encryption Monday πŸ”’

Cyrill KrΓ€henbΓΌhl and Adrian Perrig, both of ETH Zurich, are authors of our study on Trends in Data Protection and Encryption Technologies. They wrote a chapter about #keymanagement.

πŸ”‘ Key management is a central part of cryptographic systems. Part of key management is the creation, secure storage, distribution, recovery, and use of keys.

πŸ“ˆ In particular, advances in hardware security modules and the development of low-cost as well as high-quality random number generators present opportunities for secure and affordable key management. However, challenges such as quantum resistance require new key management systems.

πŸ“‘ Key management also offers potential for the military to develop new systems through cryptographic keys.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Securepositioning #Securelocalization #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-11-20

πŸ”’ Encryption Monday πŸ”’

Martin Strohmeier, from the Cyber-Defence Campus, is an author of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Secure Positioning and #Localization.

πŸ“‘ Secure positioning and localization deals with the precise determination of the location of an object or person using technological means, such as Wi-Fi, Bluetooth or GPS.

πŸ”’ Various methods are proposed for efficient location determination that focus, among other things, on cryptographically securing content. Examples include loss-tolerant, time-efficient authentication or distance bounding.

πŸš— The increasing importance of autonomous vehicles illustrate the importance of robust navigation and location capabilities.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Securepositioning #Securelocalization #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-11-13

πŸ”’ Encryption Monday πŸ”’

Touradj Ebrahimi, from the Γ‰cole polytechnique fΓ©dΓ©rale de Lausanne, is an author of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Secure Media.

πŸ“±πŸ“½οΈ Information and communication technologies are simplifying the creation and distribution of media content through the proliferation of mobile multimedia devices such as smartphones and high-performance cameras. Through this development non-experts have been given the opportunity to create user-generated content and share it with a wide audience.

πŸ”’ At the same time, the developments bring several challenges in terms of media security. Central to this is the issue of content creation and related issues such as source authentication. In addition, challenges may arise with the content itself, such as those related to integrity verification.

πŸ‘¨πŸ’» Various media security solutions now exist, including labeling, monitoring, fingerprinting, forensics, and watermarking.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Securemedia #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-11-06

πŸ”’ Encryption Monday πŸ”’

Yann Donon, Fabien K., Pawel Jasinski, Carl Piening and Arnaud Savary, all from RUAG, are authors of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Secure Smartphone.

πŸ“± When buying secure smartphones, attention to various factors is central, because ensuring security requires strong access control and authentication capabilities so that complex encryption can take place.

πŸ”’ Key technologies, such as data and disk-based encryption, are important for secure smartphones. Smartphones can suffer from security problems due to the fact that the technologies are not perfect.

πŸ” Smartphones can be secured through various key factors, which include encryption, mobile networks as well as trusted hardware, in addition to secure booting. These factors can help businesses and users protect themselves from data leaks and cyber attacks.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology. #EncryptionMonday #Securesmartphone #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-10-30

πŸ”’ Encryption Monday πŸ”’

Yann Donon, Fabien KΓΌnzler, Pawel Jasinski and Arnaud Savary, all from RUAG, are authors of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Secure Smartphone.

πŸ“± When buying secure smartphones, attention to various factors is central, because ensuring security requires strong access control and authentication capabilities so that complex encryption can take place.

πŸ”’ Key technologies, such as data and disk-based encryption, are important for secure smartphones. Smartphones can suffer from security problems due to the fact that the technologies are not perfect.

πŸ” Smartphones can be secured through various key factors, which include encryption, mobile networks as well as trusted hardware, in addition to secure booting. These factors can help businesses and users protect themselves from data leaks and cyber attacks.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #Securesmartphone #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-10-23

πŸ”’ Encryption Monday πŸ”’

Jean-Pierre Hubaux and Linus Gasser, both from the Center for Digital Trust (C4DT), EPFL, are authors of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #blockchain.

🌐Blockchains are decentralized systrems that are used to manage blockchain-based data systems and, unlike centralized structures, work even if some participants act maliciously; the important thing here is honesty among more than half of the entities in the network.

πŸ‘¨β€πŸ’»A central term for blockchains is digital ledger technologies, which enable decentralized data management and are not based on linked blocks.

πŸ“§ Blockchain transactions are irreversible because once a block has been recorded, the data cannot be changed retroactively and each subsequent block is linked to the previous blocks.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMondayβ€―#blockchain #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-10-16

πŸ”’ Encryption Monday πŸ”’

Linus Gasser, from the Center for Digital Trust (C4DT) from Ecole polytechnique fΓ©dΓ©rale de Lausanne, is an author of our study on Trends in #Data #Protection and Encryption Technologies and wrote a chapter about #WEB3.

πŸ’» WEB3 is the next generation of the internet with a focus on decentralization, token-based economics and blockchain technologies.

πŸ”’ It enables users to establish and use self-sovereign identities through pods that serve as secure personal web servers.

πŸ›‘οΈ The focus of WEB3 is to empower users by eliminating intermediaries, thereby increasing privacy through the direct connection between producers and consumers.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #web3 #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-10-09

πŸ”’ Encryption Monday πŸ”’

Bernhard Tellenbach, Head of Cyber Security at Cyber-Defence Campus, and LlorenΓ§ RomΓ‘, Cyber Security Project Manager at Cyber-Defence Campus, are authors of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Secure Operating System.

πŸ‘©πŸΌβ€πŸ’» The operating system serves as the core of modern computer systems, managing resources and running applications, making its security vital for data protection.

πŸ” Security-focused and security-evaluated operating systems are distinguished, with the latter preferred in high-security settings like government and military systems to meet stringent requirements.

πŸ›‘ Hardware security components, particularly for cryptographic functions, are becoming more prevalent. While secure operating systems don't eliminate all risks, they can reduce the impact of vulnerabilities in individual applications or modules on the overall system.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #SecureOperatingSystem #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-10-02

πŸ”’ Encryption Monday πŸ”’

Valentin Mulder, Scientific Project Manager at Cyber-Defence Campus, and Mathias Humbert, Associate Professor in Cybersecurity and Privacy at the University of Lausanne, are authors of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Differential Privacy.

πŸ” Differential privacy is a technology that protects individual privacy by introducing noise into shared dataset information, making it difficult to infer details about specific individuals.

πŸ”Ž It is especially useful for counting, summation, or average queries on large datasets, but it often sacrifices data accuracy in the name of privacy.

πŸ‘©πŸΌβ€πŸ’» Differential privacy offers potential benefits for government and large corporations striving to comply with data privacy requirements and regulations

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #DifferentialPrivacy #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-09-25

πŸ”’ Encryption Monday πŸ”’

Roland Meier, Scientific Project Manager at Cyber-Defence Campus, is an author of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Data in Transit Security.

πŸ‘Ύ Data in transit, or network traffic, can be intercepted, posing a risk of exposing sensitive information contained in payload, headers, or metadata.

πŸ“§ Encryption is commonly used in communication protocols to secure network traffic, but even encrypted data can inadvertently leak information via metadata.

πŸ“ˆ The proportion of encrypted network traffic has been consistently growing and is anticipated to continue, but the protection of metadata remains a challenge, leaving network traffic susceptible to traffic-analysis attacks.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #DatainTransitSecurity #TransitSecurity #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-09-18

πŸ”’ Encryption Monday πŸ”’

Louis-Henri Merino, CYD Fellow and PhD Student at Ecole polytechnique fΓ©dΓ©rale de Lausanne, is an author of our study on Trends in Data Protection and Encryption Technologies and wrote a chapter about #Electronic Voting.

βœ‹πŸΌ Remote electronic voting offers the potential to increase voter participation, accessibility, and cost-efficiency by enabling voting from anywhere using personal devices.

πŸ‘©β€πŸ’» Establishing a secure online voting system is complex and involves key requirements such as integrity, privacy, resistance to coercion, and maintaining availability.

πŸ” Successful deployment of secure e-voting systems requires cooperation among various sectors and potential assistance from military and intelligence agencies to defend against cyberattacks that could erode public confidence in the voting process.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.
#EncryptionMonday #ElectronicVoting #DataProtection #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-09-11

πŸ”’ Encryption Monday πŸ”’

Sophia Ding, Managing Consultant at Eraneos Switzerland, is an author of our study on Trends in Data Protection and Encryption Technologies. In her chapter #DigitalRightsManagement she discusses the multiple functions and the controversy of DRM.

πŸ”„ Digital rights management (DRM) facilitates secure exchange of digital information on the internet with limited user privileges determined by the sender.

πŸ” DRM systems perform various functions like access control, usage control, billing, and handling legal infringements using encryption, digital signatures, watermarks, and more.

πŸ‘Ύ DRM has been contentious due to privacy concerns, its impact on open-source software, and its conflict with fair use principles, leading to a potential loss of influence in specific industries like the traditional music sector.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #DigitalRightsManagement #DataProtection, #CyberSecurity

Cyber-Defence Campuscydcampus@infosec.exchange
2023-09-04

πŸ”’ Encryption Monday πŸ”’

Dina Mahmoud, Cyber-Defence Campus Doctoral Fellow at EPFL, is an author of our study on Trends in Data Protection and Encryption Technologies. In her chapter #HardwareAcceleration she covers alternative approaches to improve computing performance.

πŸ’‘ Moore's law and Dennard's scaling are no longer driving computing performance improvements, necessitating the exploration of new avenues like hardware acceleration.

πŸ‘©β€πŸ’» Hardware acceleration offers high levels of parallelism, particularly suited for modern applications.

🀝 When considering hardware acceleration, parties must evaluate factors like building their own accelerators or buying from third parties, with specific considerations relevant to different actors.

πŸ“— Study Trends in Data Protection and Encryption Technologies: lnkd.in/ebjKZSZr

πŸ”œ Stay tuned for next week's encryption technology.

#EncryptionMonday #HardwareAcceleration #DataProtection

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst