Page 42 - Cyber Warnings
P. 42







Technology reinforcements from vendors

The developer and vendors in the global encryption software market know the best practice
guidelines by heart and soul. They have a defined agenda to guard the interests of their
consumers and consequentially their own business. The foremost in feature in this list is to steer
clear of any provision for backdoors. Virtual drive creation and encryption, whether on a system
or on cloud, is another suggested approach. Some of the products out there also offer
overwriting the original files at the storage location once a deletion attempt is made post the
creation of an encrypted copy. Even in the presence of more intricate algorithms, Advanced
Encryption System (AES) remains the standard (and approved by U.S. government) for regular
users. The combination of public and private keys for transfer and reception of secured file sand
folders is another practice that is a benchmark for evaluating the robustness of an algorithm.

User awareness and responsibilities

However, the above-mentioned practices collectively comprise one side to the complete story.
On behalf of the enterprises and consumers that employ these products at the end of the supply
chain, there are far-reaching and minute considerations that need to be realized before making
any purchases. A user is expected to compulsorily realize possible vulnerable nodes in their
system. Next, a distinct segregation of levels is required in which the encryption strategy will be
employed. Safekeeping the guarding keys and passwords from being potential threat sources is
an obvious requisite. A close monitoring of the employee-owned devices and encouraging them
to use end-to-end for these is yet another precautionary move which strengthens their network
security.

The global encryption software industry is motivated by these social, governing, and technical
factors. Its impending growth and success lies in these best practices, which when adopted
aptly by the manufacturers and end-users will overcome potential hindrances and achieve
outstanding financial targets.



About The Author

Anamika Kumari is a Level II Content Writer at the Allied Analytics LLP.

Anamika Kumari has pursued her Bachelor’s degree in Electrical
Engineering, and is certified in industrial automation. She is deeply
fascinated by the impact of modern technology on human life and the earth
at large. Being a voracious reader, passionate writer, and a critical observer
of market dynamics, she has a strong taste for the hidden science behind all
arts.

Anamika can be reached online at [email protected] and at our company
website http://www.alliedmarketresearch.com


42 Cyber Warnings E-Magazine November 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   37   38   39   40   41   42   43   44   45   46   47