Saturday, October 5, 2019

Cyber Security Digital Data Protection

Digital data protection is important to protect from security breaches below.
  • Data Theft
  • Denial of service
  • Integrity Attacks
Data Theft and Email:
Digital information categorised into two ways structured and unstructured data.

Structured Data:
  • Structured Data controls available for typical data.
  • Structured data stored in database.
Unstructured Data:
Unstructured data's like email and file attachments, word/pdf, excel, pictures and videos.

A look at Deficiency:
  • A weak user authentication and permissions.
  • Transmission in the clear.
  • No controls of intermediate servers.
  • No control over redistribution.
Sieve  RFC 5228:
Sieve  is a language for filtering e-mail messages. Sieve is designed to be implementable on either a mail client or mail server. Sieve is meant to be extensible, simple and independent of access protocol, mail architecture and operating system.
  • Email messages unencrypted can be hacked.
  • Sender emails copied send to email server, sender email server copy the email in mail server and send to  recipients email server coped email and send to original recipient.
  • Email has no control on email server.
  • Always whenever you are using Gmail, outlook, yahoo, they will download a copy to their own mail servers.
  • Email servers are owned by third party server.
  • After 180 days your emails are considered 'abandoned'.
  • Email older than 6 month - no warranty or portable cause required.
  • By the means of wire tapping email servers hacked by hackers.
The Gateway of Email Server:
Email server has gateway as SMTP email, 90% of Malware smuggled in via SMTP email gateway.

SMTP:Simple Mail Transfer Protocol:

Simple Mail Transfer Protocol (SMTP) is the standard protocol for email services on a TCP/ IP network.
SMTP port 587 is used with encryption messages with wrapper.
  • SMTP Port 25 is the default port used for relaying.
  • SMTP Port 465 should no longer be used at all.
  • SMTP Port 2525 used when all other port is blocked.
SMTP Inherent vulnerability:
  • SMTP vulnerabilities is unsecured storage and transmission.
  • SMTP  is lack of redistribution controls.
  • SMTP is lack of temporal.
Partial solutions:
  • Transmission Encryption which will encrypt the connection but this can be compromised.
  • Bulletin board systems
  • Add on message encryption
  • Enhanced authentication
Bulletin board solutions for secure email:
  • Recipients to get email notifications to log into a Web portal for their messages.
  • Bulletin boards are user friendly.
  • Bulletin boards are high quality and encrypted.
Add on Message:
  • Add on message is used to stop Phishing.
  • But add on message not having capacity to stop spear Phishing.
  • Add on message encrypt stored and sent emails.
Enhanced authentication:
Enhanced authentication will be used to prevent from any attack by hacker.

Root cause:
Generally unstructured data files can be easily copied from victim to attacker. So cyber  security measures are important.

The Fix:Securing files By default:
The fix will be only using encrypted Internet connection, so we need to follow below steps,

Step:1: Application file will generate encryption key specific to files.
Step:2: Application automatically locks the file
Step:3: Application able to hide true file name.
Step:4: Application will create a new special shared key.
Step:5: Also application creates a specific file key to user.

Secure Data at Creation:
Granularly encrypt each data object with AES 256 symmetric encryption.

www.absio.com is best source which offers below,
  • Absio offers email encryption service.
  • Secures data at rest.
  • Encrypt each file with its own key.
  • Distributed key management.

Hill Station view:

1 comment:

felisha green said...


If you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest

Email: cybergoldenhacker at gmail dot com

Explore Me

Networking- Cisco IOS XR

Cisco IOS XR found in service providers routers like 12000 series cisco IOS XR. Cisco IOS XR originally designed for 64 bit operations....