ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Local Encryption ... Why Not?

    IT Discussion
    15
    357
    173.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • BRRABillB
      BRRABill @scottalanmiller
      last edited by

      @scottalanmiller said:

      If it data is exposed and compromised? How would they explain that one? "Well there has been a breach, but we don't consider it a breach so screw you people who had your data stolen."

      The data is inaccessible.

      Unless you portend to be able to crack 256-bit encryption.

      scottalanmillerS 1 Reply Last reply Reply Quote 0
      • DashrenderD
        Dashrender @BRRABill
        last edited by

        @BRRABill said:

        @scottalanmiller

        I edited this. 🙂

        Judge: "How much data was on there."
        IT Person: "None"
        Judge: "Are you sure? How can you prove that?"
        IT Person: "Uhhhhhhh"

        There are a few things to consider - you'd only be there if you self reported or there was a release of data that was linked back to your company about a breach larger than 500 individuals. So if you didn't already think there was data on there, why are you in front of the judge?

        BRRABillB scottalanmillerS 2 Replies Last reply Reply Quote 0
        • BRRABillB
          BRRABill @Dashrender
          last edited by

          @Dashrender said:

          There are a few things to consider - you'd only be there if you self reported or there was a release of data that was linked back to your company about a breach larger than 500 individuals. So if you didn't already think there was data on there, why are you in front of the judge?

          Surely you aren't implying you wouldn't report a breach!

          Of course you wouldn't need to with a SED. 😉

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @BRRABill
            last edited by

            @BRRABill said:

            @scottalanmiller said:

            If it data is exposed and compromised? How would they explain that one? "Well there has been a breach, but we don't consider it a breach so screw you people who had your data stolen."

            The data is inaccessible.

            Unless you portend to be able to crack 256-bit encryption.

            That something is 256bit alone does not imply that it isn't easy to access. That's just one factor. There are cases where it is indeed easy to crack. And cases where it is very hard. But that alone doesn't suggest that a comprise isn't likely.

            BRRABillB 1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @Dashrender
              last edited by

              @Dashrender said:

              @BRRABill said:

              @scottalanmiller

              I edited this. 🙂

              Judge: "How much data was on there."
              IT Person: "None"
              Judge: "Are you sure? How can you prove that?"
              IT Person: "Uhhhhhhh"

              There are a few things to consider - you'd only be there if you self reported or there was a release of data that was linked back to your company about a breach larger than 500 individuals. So if you didn't already think there was data on there, why are you in front of the judge?

              It's when data is linked back to you.

              1 Reply Last reply Reply Quote 0
              • BRRABillB
                BRRABill @scottalanmiller
                last edited by BRRABill

                @scottalanmiller said:

                That something is 256bit alone does not imply that it isn't easy to access. That's just one factor. There are cases where it is indeed easy to crack. And cases where it is very hard. But that alone doesn't suggest that a comprise isn't likely.

                But it is that same evidence trail.

                Complex (whatever that means to you) password coupled with assurance the encryption was on. That's what they are looking for.

                You are correct in that if the password is 1234 it's easy to crack. But it is not so easy if you are using the recommended letters, numbers, etc..

                And this is just for the case of "oooops, someone stole my laptop while I was in Starbucks" not some sort of crazy hacker hellbent to get your data.

                To a point you've previously made:
                this isn't about keeping data the most secure, per se, but rather getting the government off your back

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @BRRABill
                  last edited by

                  @BRRABill said:

                  You are correct in that if the password is 1234 it's easy to crack. But it is not so easy if you are using the recommended letters, numbers, etc..

                  Studies show that those factors do absolutely nothing to slow cracking. It's purely for duping humans into feeling things are secure, it does nothing to secure against an attack. Only length does that in any meaningful way. Complexity is a direct enemy of security because it makes humans unable to remember it while making it no harder for a computer to crack.

                  BRRABillB 1 Reply Last reply Reply Quote 1
                  • BRRABillB
                    BRRABill @scottalanmiller
                    last edited by

                    @scottalanmiller said:

                    @BRRABill said:

                    You are correct in that if the password is 1234 it's easy to crack. But it is not so easy if you are using the recommended letters, numbers, etc..

                    Studies show that those factors do absolutely nothing to slow cracking. It's purely for duping humans into feeling things are secure, it does nothing to secure against an attack. Only length does that in any meaningful way. Complexity is a direct enemy of security because it makes humans unable to remember it while making it no harder for a computer to crack.

                    Right.

                    If you are serious about it not getting cracked, it's gotta be looooooong.

                    scottalanmillerS 1 Reply Last reply Reply Quote 0
                    • BRRABillB
                      BRRABill
                      last edited by

                      I spoke a little bit with @scottalanmiller offline about this.

                      I now understand that servers under high security, such as in a data center, probably do not need encryption, because the odds of them getting stolen is very small. I also learned some interesting things about data centers.

                      I also now understand that Server 2012 is still pretty easily hackable if you have access to the physical machine. I guess I thought they would have fixed that by now, LOL.

                      So my discussion now falls down to locations that might not be as secure as they should be, yet need to have a server on premises. Ideally, these locations would benefit from not having a server on premises, but this is not always possible. Either by using a VPS, or by utilizing cloud options for critical services/data if possible.

                      The reasoning behind not using encryption on a server (including something like a PIN for Bitlocker) is that
                      a -- you cannot distribute the password to the staff because it weakens security or they'll put it on a post-it on the screen and
                      b -- you'd need a high ranking person to be present at every server reboot, which might not be palatable to these high ranking people

                      Regarding endpoints, of course we would liek to see no important data located on the endpoint. But if data must be present (such as in the example where a 3rd party software product that cannot use the cloud), it makes sense to encrypt the local hard drive.

                      I think one of the only sticking points we still have in this discussion is the question as to why not just use a SED in any device in environemnts where there might be sensitive data on the end point. With a strong enough password, I feel it would provide pretty adequete protection to a casual thief/hacker.

                      @scottalanmiller ... what do you think?

                      1 Reply Last reply Reply Quote 0
                      • DashrenderD
                        Dashrender
                        last edited by

                        What are you paying for SEDs?

                        BRRABillB 1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller @BRRABill
                          last edited by

                          @BRRABill said:

                          @scottalanmiller said:

                          @BRRABill said:

                          You are correct in that if the password is 1234 it's easy to crack. But it is not so easy if you are using the recommended letters, numbers, etc..

                          Studies show that those factors do absolutely nothing to slow cracking. It's purely for duping humans into feeling things are secure, it does nothing to secure against an attack. Only length does that in any meaningful way. Complexity is a direct enemy of security because it makes humans unable to remember it while making it no harder for a computer to crack.

                          Right.

                          If you are serious about it not getting cracked, it's gotta be looooooong.

                          Every extra character makes it quite a bit longer to crack. Complexity doesn't slow it down in any way.

                          BRRABillB DashrenderD 2 Replies Last reply Reply Quote 0
                          • BRRABillB
                            BRRABill @Dashrender
                            last edited by

                            @Dashrender said:

                            What are you paying for SEDs?

                            For endpoints, I buy the Samsung EVO line. They are pretty reasonable these days.

                            The software that manages the encryption is $39. I'm not sure what it costs in a larger scale.

                            1 Reply Last reply Reply Quote 0
                            • BRRABillB
                              BRRABill @scottalanmiller
                              last edited by

                              @scottalanmiller said:

                              Every extra character makes it quite a bit longer to crack. Complexity doesn't slow it down in any way.

                              Do you have statistics on how long it takes to guess passwords of a given length?

                              I looked through quite a few articles and the estimates are all over the place.

                              scottalanmillerS 1 Reply Last reply Reply Quote 0
                              • DashrenderD
                                Dashrender @scottalanmiller
                                last edited by

                                @scottalanmiller said:

                                @BRRABill said:

                                @scottalanmiller said:

                                @BRRABill said:

                                You are correct in that if the password is 1234 it's easy to crack. But it is not so easy if you are using the recommended letters, numbers, etc..

                                Studies show that those factors do absolutely nothing to slow cracking. It's purely for duping humans into feeling things are secure, it does nothing to secure against an attack. Only length does that in any meaningful way. Complexity is a direct enemy of security because it makes humans unable to remember it while making it no harder for a computer to crack.

                                Right.

                                If you are serious about it not getting cracked, it's gotta be looooooong.

                                Every extra character makes it quite a bit longer to crack. Complexity doesn't slow it down in any way.

                                That's not entirely true. If you KNOW that the character set doesn't have any special characters, that's like 30 points of entropy per character lost.

                                scottalanmillerS 1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller
                                  last edited by

                                  I think that we are mostly on the same page. In the OP the question was "why wouldn't you" basically asking why every machine everywhere shouldn't be encrypted. Many machines should be, some are a middle ground of it could go either way and many should not be. Encryption adds cost, complexity and certain types of risk while reducing other types of risk, mostly around theft. If your goal is blinding speed, data is not important or you need systems that can restart themselves, encryption is problematic. If you need systems that are highly secure against physical theft, you probably want encryption. It's not that I'm saying you shouldn't have encryption, you just shouldn't have it "everywhere".

                                  BRRABillB 1 Reply Last reply Reply Quote 0
                                  • scottalanmillerS
                                    scottalanmiller @Dashrender
                                    last edited by

                                    @Dashrender said:

                                    @scottalanmiller said:

                                    @BRRABill said:

                                    @scottalanmiller said:

                                    @BRRABill said:

                                    You are correct in that if the password is 1234 it's easy to crack. But it is not so easy if you are using the recommended letters, numbers, etc..

                                    Studies show that those factors do absolutely nothing to slow cracking. It's purely for duping humans into feeling things are secure, it does nothing to secure against an attack. Only length does that in any meaningful way. Complexity is a direct enemy of security because it makes humans unable to remember it while making it no harder for a computer to crack.

                                    Right.

                                    If you are serious about it not getting cracked, it's gotta be looooooong.

                                    Every extra character makes it quite a bit longer to crack. Complexity doesn't slow it down in any way.

                                    That's not entirely true. If you KNOW that the character set doesn't have any special characters, that's like 30 points of entropy per character lost.

                                    Except you don't know that.

                                    1 Reply Last reply Reply Quote 0
                                    • scottalanmillerS
                                      scottalanmiller @BRRABill
                                      last edited by

                                      @BRRABill said:

                                      @scottalanmiller said:

                                      Every extra character makes it quite a bit longer to crack. Complexity doesn't slow it down in any way.

                                      Do you have statistics on how long it takes to guess passwords of a given length?

                                      I looked through quite a few articles and the estimates are all over the place.

                                      that's because it depends on the algorithm, the password length and the hardware used. So there is no easy answer. If you are trying to crack something with a laptop or with a Tesla cluster, you get very different results.

                                      1 Reply Last reply Reply Quote 1
                                      • BRRABillB
                                        BRRABill @scottalanmiller
                                        last edited by

                                        @scottalanmiller said:

                                        certain types of risk

                                        Being catastrophic data loss?

                                        But wouldn't a good backup cover you there?

                                        scottalanmillerS 1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller @BRRABill
                                          last edited by

                                          @BRRABill said:

                                          @scottalanmiller said:

                                          certain types of risk

                                          Being catastrophic data loss?

                                          But wouldn't a good backup cover you there?

                                          Presumably. If the assumption is that people need data in dangerous places (like laptop endpoints) because they have to work offline then the assumption is that there is data there that might not be easy to back up either.

                                          1 Reply Last reply Reply Quote 0
                                          • BRRABillB
                                            BRRABill
                                            last edited by

                                            BTW: I get what you mean about a place like a bank. If you are running updates in the middle of the night, and it needs to reboot, someone needs to be there to get it back up.

                                            But for a doctor office, no one is working at 3 in the morning. I understand your feeling that the doctor him or herself won't ant to do it. But if it is important to them, don't they have to be given the option?

                                            Of course for a bank you'd want it in a secured data center if possible.

                                            I'm talking more the fringe cases. Smaller doctor offices. Accountant with tax returns. That kind of stuff.

                                            scottalanmillerS 1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 17
                                            • 18
                                            • 2 / 18
                                            • First post
                                              Last post