Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. Then couple that with all the recent hacker activity, new reports from the GAO (that's the Government Accounting Office) that the government can't protect it's own computers and data much less the data WE send them, reports that computer theft is on the rise and news that the FBI is now developing a new computer "worm" (read virus) to spy on citizens, I decided to sing the encryption song again. This time I'll sing a verse about personal data encryption.

So what do I mean by personal data encryption? I mean ANY data on ANY storage medium that relates to you, your family or your business. Encryption is the process of scrambling electronic data in such a way that it's unreadable to all but the owner.

For the purposes of this article I'll cover two different ways to encrypt data and the pros and cons of each.

The first way is file/folder encryption. This is the process by which someone identifies what data they want to protect on a file by file or folder basis and then encodes each file or folder using some kind of software encryption tool.

What are the pros of this style of encryption? First, each file or folder can be assigned its own "encryption key". Then, even if one key gets "cracked" open, all the other files or folders will still be safe. Next, only those files and folders you identify and select will be encrypted. This allows for a "gnat's behind" level of detail that some folks need to feel secure.

What are the cons of file or folder level encryption? Well, at this level of detail, tracking of all the different encryption keys and file locations would be an administrative nightmare! So, unless you have days to spend identifying files and folders and encrypting them or if you are really, really into details, file level encryption just isn't practical for most people.

The second way to protect personal data is drive encryption. Unlike file encryption, drive level encryption allows a user to create a reserved area on the hard drive called a container. Once created, this container can be "mounted" or set to act like another fully functional hard drive on a computer. It will appear in the file manager just like any other drive.

What are the pros for drive encryption? This space can be "mounted" using a single encryption key and the key only needs to be entered once. After it's mounted, this virtual drive can contain any data and / or program, just like any regular drive. But when it's dismounted, the virtual drive is no longer visible and the container looks like any other file, the contents of which are completely inaccessible without the encryption key.

What's the down side to drive encryption? If you forget your key, all the data and / or program information in the container is lost. Also, all the information is only protected by a single key. So if your key is compromised, all your information is available to prying eyes.

What's my recommendation? Drive encryption. Drive encryption is far more efficient than file encryption especially if you need to access your data frequently. Drive encryption also allows for the complete encryption of programs, something virtually impossible to do with file level encryption. (Well not impossible but certainly problematic and time consuming!) And by creating an encryption key of sufficient size and complexity, the single key issue becomes almost moot.

One site I visited recently stated that it would take one million computers performing one million operations per second approximately 11 trillion years to crack a 128 bit encryption key! So, by using an encryption key of about 64 random characters, a hacker would need multiple life times to crack open your files.

There are several programs available online for both file and drive encryption. All these programs differ in functionality, price, encryption algorithms and interfaces. The best way to proceed is to do a search from your favorite search engine on encryption tools and read about the options available.

Don't wait! The day will come when your system gets compromised by some hacker or thief or FBI agent and then you'll wish you had protected your data.

Privacy is your right! Exercise it!

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.

He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Gallup

Security Issues Continue to Plague Central America
Gallup
Police crackdowns on anti-government protesters -- which have resulted in hundreds of deaths since the protests began in April -- likely did not help security perceptions. Currently, both measures mark new lows in Gallup's 12-year trend for Nicaragua.


Nature.com

Quantum computers put blockchain security at risk
Nature.com
Blockchain security relies on 'one-way' mathematical functions. These are straightforward to run on a conventional computer and difficult to calculate in reverse. For example, multiplying two large prime numbers is easy, but finding the prime factors ...

and more »

ZDNet

Security warning: UK critical infrastructure still at risk from devastating cyber attack
ZDNet
Describing this set up as "wholly inadequate" and "inappropriate in view of the Government's own assessment that major cyber attacks are a top-tier national security threat," the committee recommends that the government appoints a Cabinet Office ...
Parliament Tears Into National Cyber Security Programme, Calls for AuditComputer Business Review
UK power grid vulnerable as government failing on cyber securitySky News

all 76 news articles »

USA TODAY

Kanye West donates $150000 to family of security guard fatally shot by police
USA TODAY
Kanye West is doing his part to help the family of Jemel Roberson, the security guard who was fatally shot by a police officer in Chicago earlier this month while he was detaining a suspected gunman. West donated $150,000 to a GoFundMe page set up by ...
Kanye West donates $150000 for security guard killed by officer in suburban ChicagoCNN
Kanye West donates $150G to family of black security guard killed by white officerFox News
Kanye West donates $150K for security guard killed by officer in RobbinsWGN-TV
fox2now.com -14 News WFIE Evansville -GoFundMe -CNN
all 244 news articles »

The Verge

Abode's Iota is a security camera, motion sensor, and gateway all in one
The Verge
Smart home security company Abode is releasing an all-in-one security device that combines elements of three different products into one. The Iota home security system contains a 1080p security camera, a motion sensor, and a gateway (the hub of the ...


Complex

Fired WWE star hijacks 'Survivor Series,' gets slammed by security
New York Post
Fired WWE superstar Enzo Amore got bodyslammed by a security guard and booted out of the Staples Center on Sunday night after he tried to hijack the live taping of the company's popular PPV event “Survivor Series.” The hectic scene was caught on ...
Disgraced Wrestler Enzo Amore Storms WWE Event, Gets Tossed by SecurityComplex
Enzo Amore Kicked Out Of WWE Survivor Series By Security After Cutting PromoMandatory

all 1,808 news articles »

Foreign Policy (blog)

Security Brief: The Generals' Pentagon; Dispatch from Halifax
Foreign Policy (blog)
The Pentagon's civilian arm is struggling to maintain its influence as the military increasingly exerts its voice on key policy decisions. Foreign Policy's Robbie Gramer reports from the Halifax International Security Forum, where the United States ...

and more »

fox5sandiego.com

Lawsuit accuses MTS, security personnel of using excessive force
fox5sandiego.com
SAN DIEGO — Four men are suing the Metropolitan Transit System, one of its code compliance inspectors and a private security contractor over allegations that the trolley personnel assaulted them, used excessive force and violated their civil rights ...


Fox News

Dem governor's trips bust state's $2.6M security and travel budget
Fox News
In the past year, Inslee has made appearances in more than a dozen states – on official business and to campaign for Democratic candidates. The security detail that follows Inslee to-and-from events is akin to the Secret Service assigned to President ...


New York Times

Netanyahu, Citing Israel's Security, Tries to Salvage His Government
New York Times
JERUSALEM — Prime Minister Benjamin Netanyahu of Israel made an impassioned attempt on Sunday to salvage his crumbling government, warning his teetering coalition partners that toppling the government at such a complex time for national security ...
Invoking Security Situation, Netanyahu Warns of 'Irresponsible' Early Elections: 'I Have a Clear Plan'Haaretz
Netanyahu: Irresponsible to topple government at 'sensitive security time'The Jerusalem Post
Mr. Security or Mr. Politics? 8 things to know for November 19The Times of Israel

all 1,756 news articles »
Google News

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Remove Rogue Desktop Icons Created By Spyware

If you have used a Windows machine for a while,... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

SCAMS ? Be Aware ? And Report When Necessary

The Internet is a vast International Network of people and... Read More

Cyber Crooks Go Phishing

"Phishing," the latest craze among online evil-doers, has nothing to... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Adware and Spyware: The Problems and Their Solutions

The Threat10 years ago you could probably have run no... Read More

What is Spyware?

The most frustrating part of having Spyware on your computer... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders

Can you protect your computer from all possible viruses and... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Blogs as Safe Haven for Cybercriminals?

To blog or not to blog? Well, why not? Lots... Read More

How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting... Read More

Website Security - Creating a Bulletproof Site in 5 Easy Steps

When it comes to a secure website and passwords it... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More