Information Security Endangered


by InfoSecurityLab - Date: 2007-01-23 - Word Count: 298 Share This!

Sour time is coming. Spy programs are stealing information more easily. The reason is weak algorithms, which provide systems safety, for example data encryption and hashing. Information security awareness training is important: spend more time to verify page security level, when using internet for transactions.

If the page is secured, it does not mean that it is safe. Almost in all secured pages are built in SSL (Secure Sockets Layer). Do you know what features are included in SSL? The most familiar are MD4, SHA-1, AES, and RC5. Maybe for ordinary user it is enough. For attacker it is more than enough!

Strong algorithms are MD5, SHA-512, and RC6. It is recommended to use strong algorithms together. Systems weakest area makes system vulnerable on attacks. So, avoid to use already cracked algorithms, for example:

* DES (cracked in 1998);

* RC4 (cracked in 2000);

* MD5 (cracked in 2004);

* SHA-1 (big cracks founded in 2005);

* RSA (cracked all versions to RSA-640. RSA-640 cracked in 2005)

Most of all web pages SSL are using MD5, RC4, RSA-256, particularly all e-banks. If these e-banks have no time for upgrading old algorithms, maybe you have time to check out yourself this.

Click in your web browser for page properties and verify security options. Do not be surprised! Some page security level is older than mentioned in this text. That is a reason, why spyware is so strong and Trojans can easy get password and credit-card numbers.

All of SSL algorithms are scientist's achievements in deep mathematics to create as strong as possible information security before 5 to 10 years.

Now almost every algorithm is cracked and if not, then will be. Hackers are fast. After few years they will summarize all already cracked algorithms together. And it means that all week and middle week e-bank systems will fall.

Article source: InfoSecurityLab


Related Tags: information security, information security awareness, palsit, information security awareness training, informations security awareness, security training, information security endangered

Information security awareness training

Your Article Search Directory : Find in Articles

© The article above is copyrighted by it's author. You're allowed to distribute this work according to the Creative Commons Attribution-NoDerivs license.
 

Recent articles in this category:



Most viewed articles in this category: