Cyber Defense Magazine – August 2019

(Nora) #1

they would deal with something being such smart – especially if they took advantage or got the war
relying on such a solution.


The challenge of endpoint security


With the nowadays digital age, we would use the computing units and some kinds of communications
channels in order to transfer the secret message from one point to another. It’s quite well-known that the
hackers as well as cyber criminals would so easily threaten the endpoints of some digital system for a
reason if we cope with the device getting the internet connection – that device could get exposed using
so simple hacking tool. In other words, there is some concern that if you are encrypting and decrypting
the message or the entire file on your computer someone getting in possession of your IP address could
make a breach to your asset and get which sort of password or key you are using for the purposes of
your cryptographic needs. So, the crucial question here is how to manage your secret key and which
communications line to use in order to make the safe transfer from one place to another. The point is
anyone could do the espionage of your endpoint spot being connected to the web and so easily see what
you are typing on your screen. For the purposes to avoid such a scenario – we would kindly suggest to
do encryption and decryption of your sensitive content on the computer that is not connected to the
internet for a reason that would decrease the chances to the bad guys to discover what you do on your
machine. Apparently, that’s not any kind of the absolute security because there are so many professional
defense tools that could expose your electronic device even if it is not linked to the web and in so many
cases, such a system could belong to some competitors’ governments. Differently saying, there is only
the good practice that can support you to manage your risk at the lower possible level and if such a
procedure helps you to get the battle you can say you got so smart in front of your ongoing enemies.


How to manage your cryptographic key


In the modern days, there are a plenty ways to manage your cryptographic key or the entire cryptosystem.
For instance, you can always use some well-protected communications channels in order to pass your
key through so and also, some experts would suggest applying the web-based encryption key
management. Remember – we would always talk about the risk coming from being online for a reason
in such a case – even kid can expose your machine and see what you do with there. Maybe the old good
advice could work even today and that is we could try to transfer the cryptographic key and the entire
encryption procedure instructions using the special courier, so far. By this we would not mean that you
should send your secret content by post, but let’s say there should be some trusted ways of delivering
the confidential information on. In such a manner, we can talk about the in person approach that could
be the quite suitable one for the intelligent encryption key management. As you know, today everyone
would be so dependable on cyber technologies and maybe the old good courier getting the packed
message could be the right choice to so many military needs and applications especially if we know that
the air forces could seek only 24 hour to deliver anything anywhere over the globe.


There is no an absolute security


As it’s well-known, there is no the silver bullet to any concern in this world, so the similar case is with the
cryptography. Many people across the globe would want to rule the world and the mission of the
competitive security should be to get at least one step ahead of the threats. In other words, the one who
has the advantage would control his society and the role of the defense is to offer the protection and the
same human rights to all people worldwide. In the essence, it’s not easy at all to accomplish such a

Free download pdf