Is it possible to password unbreakable - Fashion - Style - Trendy

Wednesday, December 22, 2010

Is it possible to password unbreakable

Wikileaks is without a doubt the most talked about last weeks ... Countries of important data about the disclosure of data security through Wikileaks has raised the issue again. Public and private organizations to secure confidential information, really? Create an unbreakable code and data is completely possible to make the third out of sight? Symantec Data Leakage Protection and Encryption Technologies data security and encryption systems, the Director talked with Jamie Cowper.



- Public or private sector institutions, is concerned about the security of their information. Encounters difficulties, such as the protection of information during the what?

In fact, in this regard there is no difference between private and public institutions. For example, information about patients if we consider the protection of the health sector, banks, credit card information, the protection of users in an organization or private corporation for the protection of customer information is extremely important. The most important point here is this: This is where critical information is kept, and of course have to know what knowledge is of critical importance.

- Agencies may come from inside or outside threats to the security and privacy may be what?

Looking at our research institutions, as Selina OZTURK interview hurriyet.com.trSymantec threats to collect under three main headings. The first one is from outside threats, potential threats ... this kind is undoubtedly the most well-known and largest in the background Stuxnet Stuxnet ... Wikileaks after the event, but the threat remained the most important feature of the industrial control systems have also actually affect. So when talking about the past-only system crashes, now you're face to face threats that affect the wider community. Organized crime units of the causes of such threats, hackers, because not only does not act alone, in the form of organization organizations came together to organize the attack and editing. Data processing department of internal threat more than the new arrivals or new learners of the new issue, encrypt or decrypt data at regular intervals laptop'larındaki does not change the users in the unconscious. Separated from work and leaving along with the latest threat to important information about the company ... take it easy this type of data is very important cases about the company and the security barriers out of the direct exceeded sızabiliyor edilemeyebiliyor immediately recognize this situation. Data in this way out of the company issuing the former employees, can use as leverage against the company and the money for this data to other companies sell this data.

- Why encryption is a critical component?

When it comes to industry standards for encryption of passwords is the most important feature ... This is not encodings encoding that Symantec or other companies, industry standards, which represents a system. In other words, the world standards bodies in this area there are certain organizations and determines that the encryption system. Passwords are not specific to anyone of these systems, mechanisms that protected by law. Take our own solutions, such as manufacturers in the use of this standard. When using the appropriate encryption methods on the streets of any user, not open even if the state criminal organizations and even passwords can be improved.

- Encryption technologies are the most recent developments?

On the one hand developing encryption standards in the case of assault against the party encryption for continuous work on the broken system are continuing. So the priority is the creation of continuous strong encryption algorithms.

- Are there any unbreakable password?

Unbreakable code "for the moment" is. If you need to open forever, "unbreakable code" there is no break in the long run, but there are possibly non-encryption systems. So, regardless of the encryption system, must eventually be broken. However, an important time as possible to delay the break. For example, after 10 years with a strong encryption, which encrypts the possibility of breaking even may be in question.

- The biggest users, the passwords used to say what steps users should follow to create a ring ... a strong password?

Those who want to steal passwords, or using a dictionary, users can link to individual words in the experiment begins. The user name of his country, his brother's name, school is very easy to solve, such as passwords are easily guessable. For this reason, users first have to create passwords that can not be easily guessed. When it comes to the number of passwords required kaçmamak easy to jump again. Dictionary, code scanning systems as well as starting from scratch, 1, 2, 3, 4 in the form of letters, numbers, and with it, allowing the scanning resolution of passwords and "brute-force search", also known as the existing screening techniques. To overcome this, creating a big week in the user's password case-use, password, and finally give the figures of the "@", "&" symbols such as the use of a special password that will strengthen even more. Of course, passwords need to be concerned with the number of households. Password minimum 8 characters when creating passwords is very important occurrence.

No comments:

Post a Comment