Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Its Time to Sing the Encryption Song - Again! > NetSparsh - Viral Content you Love & Share

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. Then couple that with all the recent hacker activity, new reports from the GAO (that's the Government Accounting Office) that the government can't protect it's own computers and data much less the data WE send them, reports that computer theft is on the rise and news that the FBI is now developing a new computer "worm" (read virus) to spy on citizens, I decided to sing the encryption song again. This time I'll sing a verse about personal data encryption.

So what do I mean by personal data encryption? I mean ANY data on ANY storage medium that relates to you, your family or your business. Encryption is the process of scrambling electronic data in such a way that it's unreadable to all but the owner.

For the purposes of this article I'll cover two different ways to encrypt data and the pros and cons of each.

The first way is file/folder encryption. This is the process by which someone identifies what data they want to protect on a file by file or folder basis and then encodes each file or folder using some kind of software encryption tool.

What are the pros of this style of encryption? First, each file or folder can be assigned its own "encryption key". Then, even if one key gets "cracked" open, all the other files or folders will still be safe. Next, only those files and folders you identify and select will be encrypted. This allows for a "gnat's behind" level of detail that some folks need to feel secure.

What are the cons of file or folder level encryption? Well, at this level of detail, tracking of all the different encryption keys and file locations would be an administrative nightmare! So, unless you have days to spend identifying files and folders and encrypting them or if you are really, really into details, file level encryption just isn't practical for most people.

The second way to protect personal data is drive encryption. Unlike file encryption, drive level encryption allows a user to create a reserved area on the hard drive called a container. Once created, this container can be "mounted" or set to act like another fully functional hard drive on a computer. It will appear in the file manager just like any other drive.

What are the pros for drive encryption? This space can be "mounted" using a single encryption key and the key only needs to be entered once. After it's mounted, this virtual drive can contain any data and / or program, just like any regular drive. But when it's dismounted, the virtual drive is no longer visible and the container looks like any other file, the contents of which are completely inaccessible without the encryption key.

What's the down side to drive encryption? If you forget your key, all the data and / or program information in the container is lost. Also, all the information is only protected by a single key. So if your key is compromised, all your information is available to prying eyes.

What's my recommendation? Drive encryption. Drive encryption is far more efficient than file encryption especially if you need to access your data frequently. Drive encryption also allows for the complete encryption of programs, something virtually impossible to do with file level encryption. (Well not impossible but certainly problematic and time consuming!) And by creating an encryption key of sufficient size and complexity, the single key issue becomes almost moot.

One site I visited recently stated that it would take one million computers performing one million operations per second approximately 11 trillion years to crack a 128 bit encryption key! So, by using an encryption key of about 64 random characters, a hacker would need multiple life times to crack open your files.

There are several programs available online for both file and drive encryption. All these programs differ in functionality, price, encryption algorithms and interfaces. The best way to proceed is to do a search from your favorite search engine on encryption tools and read about the options available.

Don't wait! The day will come when your system gets compromised by some hacker or thief or FBI agent and then you'll wish you had protected your data.

Privacy is your right! Exercise it!

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.

He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

The Hill

Russian Defense Ministry says it's ready to boost security cooperation with US
The Hill
"The Russian Defense Ministry is ready for practical implementation of the agreements in the sphere of international security reached by Russian and U.S. Presidents, Vladimir Putin and Donald Trump, at their Monday's summit in Helsinki," Igor ...
Rubio, Warner Stress Election Security After Trump-Putin SummitWIRED
Russian Defense Ministry 'Ready' to Implement Putin-Trump Security AgreementsNewsweek
Trump stresses Israel's security in talks with PutinReuters
The Register -Just Security -TPM
all 3,624 news articles »

Petoskey News-Review

New security measures begin next week at Emmet county building
Petoskey News-Review
... of acts of violence resulting in deaths and personal injuries,” in public buildings throughout the United States and sought to “provide an enhanced level of safety and security in the Emmet County Building by restricting the entry of weapons into ...


Washington Post

'Morally repugnant': Homeland Security advisory council members resign over immigration policies
Washington Post
Four members of a Homeland Security advisory council have resigned in protest over the Trump administration's immigration policies, citing the “morally repugnant” practice of separating immigrant families at the border. Richard Danzig, former secretary ...
Homeland Security advisory council members resign over family separations: reportThe Hill

all 4 news articles »

Aljazeera.com

Unprecedented security at Kashmir's annual Hindu pilgrimage | Asia ...
Aljazeera.com
Last year, fighters targeted a tourist bus, killing eight people who were performing the gruelling Amaranth Yatra.

and more »

USA TODAY

Denver airport's massive transformation: new gates, smoother security
USA TODAY
Hundreds of flyers wait in TSA security lines in Denver International Airport's Great Hall. Airport managers have launched a major renovation of the hall, hoping to speed up security screenings and improve the passenger experience. (Photo: Trevor ...

and more »

Military Times

MAVNI troops falsified records, were security risk, DoD says
Military Times
Mattis, “provide context for you regarding the true national security issues at stake,” said Pentagon spokeswoman Air Force Maj. Carla Gleason. The U.S. District Court Western District of Washington is considering the lawsuit, which was filed on behalf ...


Bloomberg

Coinbase Wins Nod on Deals as It Seeks to Add Security Coins
Bloomberg
Coinbase Inc., one of the most popular cryptocurrency platforms, said it got the green light from U.S. watchdogs to move forward with a trio of acquisitions that will allow it to become one of the first federally regulated venues for trading digital ...
Coinbase Says It Now Has Regulatory Approval to List Security TokensCoinDesk
Coinbase Gains SEC Approval to List Security TokensBitcoinist
Coinbase Gains Approval to List Security TokensCryptoSlate
CCN -Bloomberg -The Coinbase Blog
all 41 news articles »

Xconomy

Security Firm ObserveIT Grabs $33M to Get Ahead of Insider Threats
Xconomy
Cyber breaches caused by people within businesses and organizations, both accidental and malicious leaks, continue to multiply. Now, a Boston security startup is arming itself with more cash and enhanced technology to try and stop these insider threats.

and more »

Mashable

Get the Ring spotlight security cam for 30% off on Amazon Prime Day
Mashable
The motion-censored security camera allows you to view what's going on at your home at all times, straight from your phone or computer using the free Ring App. You can create and customize your own motion zones so you can focus in on whatever areas ...
This Best-selling Home Security Camera With Over 13K Rave Reviews Is on Sale for Amazon Prime DayTravel+Leisure

all 2,893 news articles »

MSNBC

McFaul: Trump with Putin shows US 'national security crisis'
MSNBC
Michael McFaul, former U.S. ambassador to Russia, talks with Rachel Maddow about the public reaction to Donald Trump's deference to Vladimir Putin at their Helsinki press conference, and what the appropriate public response is to the realization that ...

Google News

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

A New Low

A new variation of the Nigerian Scam theme ... Read More

Is Adware - Spyware Putting Your Privacy at Risk

Do you sometimes notice your computer running slower. Is your... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

The Never Ending Spyware Story

It's been with us since 1993, it's gotten more intrusive,... Read More

Spyware Programs Are Out To Get You!

The average computer is packed with hidden software that can... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

40 Million People Hacked - YOU as Identity Theft Victim

Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

5 Tips For An Unbreakable Password

Despite the current wave of identity theft and corporate security... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

Types Of Computer Infections

Computer infections can be broken up into 4 main categories... Read More

Dont Allow Hackers to Take Out Money from Your Bank Account

If you know what is the 'Fishing' then it's very... Read More

The Bad Guys Are Phishing For Your Personal Information

Do you know what "phishing" is?No, it doesn't mean you... Read More

Wells Fargo Report Phishing Scam

First off I should explain what phishing is. Phishing is... Read More