Information Security Endangered
Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithms, which provide systems safety, for example data encryption and hashing. Information security awareness training is important: spend more time to verify page security level, when using internet for transactions.
If the page is secured, it does not mean that it is safe. Almost in all secured pages are built in SSL (Secure Sockets Layer). Do you know what features are included in SSL? The most familiar are MD4, SHA-1, AES, and RC5. Maybe for ordinary user it is enough. For attacker it is more than enough!
Strong algorithms are MD5, SHA-512, and RC6. It is recommended to use strong algorithms together. Systems weakest area makes system vulnerable on attacks. So, avoid to use already cracked algorithms, for example:
* DES (cracked in 1998);
* RC4 (cracked in 2000);
* MD5 (cracked in 2004);
* SHA-1 (big cracks founded in 2005);
* RSA (cracked all versions to RSA-640. RSA-640 cracked in 2005)
Most of all web pages SSL are using MD5, RC4, RSA-256, particularly all e-banks. If these e-banks have no time for upgrading old algorithms, maybe you have time to check out yourself this.
Click in your web browser for page properties and verify security options. Do not be surprised! Some page security level is older than mentioned in this text. That is a reason, why spyware is so strong and Trojans can easy get password and credit-card numbers.
All of SSL algorithms are scientist's achievements in deep mathematics to create as strong as possible information security before 5 to 10 years.
Now almost every algorithm is cracked and if not, then will be. Hackers are fast. After few years they will summarize all already cracked algorithms together. And it means that all week and middle week e-bank systems will fall.
Article source: InfoSecurityLab
Related Tags: information security, information security awareness, palsit, information security awareness training, informations security awareness, security training, information security endangered
Information security awareness training
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- What Is Spyware?
If you use a computer then there are certain things that you have to be educated about. Spyware is o - There's No Such Thing As The Perfect Password
Even though you can get advice on how to create the perfect password, it's important to realize that - Shopping Online For Contacts: Security And Privacy
The Fairness to Contact Lens Consumer Act, signed into law in 2004, empowered lens wearers with the - Step-by-step Procedure Of Ssl Certificate Installation
SSL certificates are used to transfer the private data entered on the user computer to the website o - Software Protection Versus Code Obfuscation - Stable Software Protection
Security of intellectual property is crucial for every business in today's modern reality. Competiti - Portable Mini Digital Video Recorder
Portable Mini Digital Video Recorder is one of the world's smallest high-resolution mini Digital Vid - Protecting Domain Name From Cyber Squatting And Hijacking
Before I go into details about protecting domain name you should first know that there is no busines - Finding Email Senders Using Reverse Email Lookup
Most of our email inboxes are flooded with so many solicited and unsolicited messages that it's ofte - Confidentiality With Secure Email
Confidentiality, in any business, is among the most significant key in order to keep a client. There - Covering Your Computer's Footprints
When you delete a file, email, or piece of internet history on your computer, where do you think it
Most viewed articles in this category:
- How Does Ssl Fit Into the Over Scheme of Internet Security?
Internet has become an integral part of our life. Most of us prefer to do maximum amount of transact - Tips of Security
Protecting private information Information is the lifeblood of most, if not all, modern organis - Internet Attack Methods
The U.S. Government's National Information Assurance Glossary defines Information Security as: Prote - Your Security Awareness Iq
Article about security awareness: Are you aware of the need for security? Your awareness o - Computer Viruses
In information security , computer virus is a manmade program or piece of code that is loaded onto y - In Reality, Spyware is Always a Threat
I received a spam email the other day and the subject said "Tired of reality shows? Make your ow - The Top 7 Threats to your Computer in 2007
Now that the holidays are behind us, the cost-conscious among us will be looking for those "post-hol - Security Using Public Internet Array Access
Internet comes to peoples lives and then suddenly comes truth, that WE CAN'T LIVE WITHOUT INTERNET. - Enslaving the Airwaves: the Repercussions of Insecure Wireless Networks
There is no doubt that wireless technology has evolved the way we communicate. With the popular 2.4 - Anti-virus Software Comparison Test
Virus.gr tested quite a few different software companies to see how they would stack up against each