DATA PROTECTION AND ENCRYPTION
Data protection and encryption is used to protect information in transit and at rest. The primary function of data encryption is keeping information out of the hands of those who should not be granted access to sensitive information.
DATA ENCRYPTION CHALLENGES
Data encryption uses symmetric and asymmetric keys. Only the correct key can decrypt the data. Brute Force is the process of attackers trying multiple random keys in an attempt to find the correct key.
A side-channel attack goes after the implementation of a cipher instead of a cipher itself. This probes weaknesses in system design.
Cryptanalysis attacks attacks will exploit potential weaknesses within a cipher. These can include man-in-the-middle attacks along with other methods.
Key Management and adequate key security, including the protection of key rotation and key confinement policies (i.e. never allowing key swaps).
We cover both encrypting the data and the path, protecting keys, BYOK, BYOE, HYOK and Tokenisation.
Data Level Encryption
Session Level Encryption
WANT TO LEARN MORE ABOUT JELLYFISH?
AU: +61 2 6140 4494
NZ: +64 4909 7580
Auckland | Brisbane | Canberra
London | Melbourne | Sydney
Wellington | Washington DC