SlideShare a Scribd company logo
Alaina Brantner
@afterwords_t9n
58th Annual Conference
American Translators Association
Saturday, October 28th
3:30 PM EST
Joseph Wojowski
@ferluc666
information is beautiful - World's Biggest Data Breaches
Overview
• Identifying the issues
• Qualifying Data Management and Storage Systems
• Qualifying Providers
• Preventing breaches
Identifying the issues
• Wording and Marketing
• Data collection
(cookies)
• Third-party add-ons
• Mishandling content
• Hardware
• Passwords
Top 500 Passwords: Is yours here?
A Proactive Approach to Qualifying
Data Management and Storage Systems
• When qualifying CMSs, you want to look for:
• ISO 27001 Certification for Information Security Management
• Encryption
History of Encryption
• DES key algorithm 56-bit: 256 possible combinations to decrypt data
• AES key encryption
• AES 128-bit: 2128
• AES 256-bit: 2256
Why does this matter?
• DES 56-bit Encryption
• Using Base 10: ≈1,000,000,000,000,000
• Hypothetical computer checking 1,000,000,000 keys/sec =
• 1,000,000,000,000,000 seconds to find the key
• 1,000,000,000,000,000 divide out seconds/hour
• 1,000,000,000,000,000 divide out hours/day
• ≈10 days to recover the key
• In real life it could take anywhere from 6 days to a number of hours
Why does this matter?
• AES 128-bit
• 1,000,000,000,000,000,000,000,000,000,000,000,000,000
• 1,000,000,000,000,000,000,000,000,000, 000,000,000,000
• (quadrillion keys/sec = 1 million times faster than they are today)
• 1,000,000,000,000,000,000,000,000,000, 000,000,000,000 hours
• 1,000,000,000,000,000,000,000,000,000, 000,000,000,000 years
• Time to crack key: 1,000,000,000,000,000,000
• Estimated age of Universe: 13,700,000,000 years
Why does this matter?
• Quantum Computing
• Search time taken by square root ≈ million x faster
• AES 256-bit: 2256
• 1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,0
00,000,000,000,000,000,000,000,000
• Quantum computation – search taken by square root ≈ million x faster
• AES 128
• 1,000,000,000,000,000,000,000,000,000,000,000,000,000
• AES 256
• 1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,0
00,000,000,000,000,000,000,000,000
Basic Cryptography
• Symmetric Key
• Same key used to encrypt and decrypt data
• Faster than public key encryption
• Needs to be stored securely
• Secure channel required to transfer key – telephone
Basic Cryptography
• Key Encryption
• Uses two keys – a public key and a private key
• Private key does not need to be transferred
• Slower than symmetric key
Public and Private Keys
Qualifying Providers
• Initial Screening
• Non-disclosure and
confidentiality agreements
• Documentation
• Quality assurance systems
Data Security
Where do you primarily work?
(i.e. dedicated office, public space)
Do you intend to handle our content over public wifi networks?
What email domain do you share content through?
How do you store your content?
• On the cloud? If so, what service?
• Privately hosted server
How do you transfer content to any partners?
Do you use public machine translation in your work?
Have you customized the settings on your router?
Do you allow home sharing on your network?
Preventing and responding to breaches
• Properly vet internal employees and external partners
• Deliberately store and transfer content
• Strong passwords
• Authentication and two-step verification
• Encryption
• Management plan for responding to breaches
• Assessing damages
• Corrective action
• Documentation
• Audits and process improvements
Questions?
Further Reading
Wojowski, Joseph. “Data Storage and Security.” 3 Apr. 2015 josephwojowski.wordpress.com
Ibid. “Machine Translation Technology and Internet Security.” 3 Apr. 2015
Ibid. “Passwords, Data encryption, and the underutilized file format.” 18 Jan. 2016
Ibid. “The Personal Cloud: your own asteroid in cyberspace.” 30 Jul. 2015
Ibid. “Translation and the Sharing Economy: what’s yours is mine.” 9 Feb. 2016

More Related Content

PPTX
Encryption
Zeeshan Butt
 
PPTX
Network security
Donald West Rock
 
PPTX
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
EC-Council
 
PDF
CNIT 125 6. Identity and Access Management
Sam Bowne
 
PPT
Protecting Sensitive Data using Encryption and Key Management
Stuart Marsh
 
PPTX
Data Governance and Management in Cloud pak nam
PT Datacomm Diangraha
 
PPTX
Crypto academy
Paul Gillingwater, MBA
 
PDF
Incident response, Hacker Techniques and Countermeasures
Jose L. Quiñones-Borrero
 
Encryption
Zeeshan Butt
 
Network security
Donald West Rock
 
TakeDownCon Rocket City: “White Hat Anonymity”: Current challenges security r...
EC-Council
 
CNIT 125 6. Identity and Access Management
Sam Bowne
 
Protecting Sensitive Data using Encryption and Key Management
Stuart Marsh
 
Data Governance and Management in Cloud pak nam
PT Datacomm Diangraha
 
Crypto academy
Paul Gillingwater, MBA
 
Incident response, Hacker Techniques and Countermeasures
Jose L. Quiñones-Borrero
 

What's hot (19)

PDF
CNIT 50: 1. Network Security Monitoring Rationale
Sam Bowne
 
PDF
Attacks Attacks AND Attacks!
Asad Ali
 
PPTX
501 ch 2 understanding iam
gocybersec
 
PDF
CISSP Prep: Ch 6. Identity and Access Management
Sam Bowne
 
PPTX
Remote forensics fsec2016 delija draft
Damir Delija
 
PDF
CNIT 123 Ch 8: OS Vulnerabilities
Sam Bowne
 
PDF
Pki 201 Key Management
NCC Group
 
PPTX
Protecting the Crown Jewels from Devastating Data Breaches
Lancope, Inc.
 
PPTX
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Prasadu Peddi
 
PPTX
Securing private keys
Ahsan Habib
 
PDF
6414 preparation and planning of the development of a proficiency test in the...
Damir Delija
 
PPTX
IWMW 1998: Server Management (3) Controlling access
IWMW
 
PPTX
Encrytion ppt
Raj Sampat
 
PDF
Sigma and YARA Rules
Lionel Faleiro
 
PPTX
Security
Rupesh Mishra
 
PPTX
Intruders and Intrusion detection in Cryptosystems
VelanSalis
 
PDF
CISSP Prep: Ch 7. Security Assessment and Testing
Sam Bowne
 
PDF
Network Exploitation
UTD Computer Security Group
 
PPTX
Securing Data in MongoDB with Gazzang and Chef
MongoDB
 
CNIT 50: 1. Network Security Monitoring Rationale
Sam Bowne
 
Attacks Attacks AND Attacks!
Asad Ali
 
501 ch 2 understanding iam
gocybersec
 
CISSP Prep: Ch 6. Identity and Access Management
Sam Bowne
 
Remote forensics fsec2016 delija draft
Damir Delija
 
CNIT 123 Ch 8: OS Vulnerabilities
Sam Bowne
 
Pki 201 Key Management
NCC Group
 
Protecting the Crown Jewels from Devastating Data Breaches
Lancope, Inc.
 
Time and Attribute Factors Combined Access Control on Time-Sensitive Data in ...
Prasadu Peddi
 
Securing private keys
Ahsan Habib
 
6414 preparation and planning of the development of a proficiency test in the...
Damir Delija
 
IWMW 1998: Server Management (3) Controlling access
IWMW
 
Encrytion ppt
Raj Sampat
 
Sigma and YARA Rules
Lionel Faleiro
 
Security
Rupesh Mishra
 
Intruders and Intrusion detection in Cryptosystems
VelanSalis
 
CISSP Prep: Ch 7. Security Assessment and Testing
Sam Bowne
 
Network Exploitation
UTD Computer Security Group
 
Securing Data in MongoDB with Gazzang and Chef
MongoDB
 
Ad

Similar to Data Security for Project Managers (20)

PDF
Key Concepts for Protecting the Privacy of IBM i Data
Precisely
 
PDF
Track 5 session 2 - st dev con 2016 - security iot best practices
ST_World
 
PDF
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Precisely
 
PDF
Securing Sensitive IBM i Data At-Rest and In-Motion
Precisely
 
PDF
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Precisely
 
PPTX
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro
 
PPTX
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
PPTX
Protecting Sensitive Data (and be PCI Compliant too!)
Security Innovation
 
PPTX
What Does a Full Featured Security Strategy Look Like?
Precisely
 
PPTX
Encryption in the enterprise
Bozhidar Bozhanov
 
PPT
Cryptography Challenges for Computational Privacy in Public Clouds
Sashank Dara
 
PPTX
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Precisely
 
PPTX
RightScale Webinar: Security Monitoring in the Cloud: How RightScale Does It
RightScale
 
PDF
CNIT 160 4e Security Program Management (Part 5)
Sam Bowne
 
PDF
CNIT 121: 3 Pre-Incident Preparation
Sam Bowne
 
PPT
Material best practices in network security using ethical hacking
Desmond Devendran
 
PDF
Chapter 15 incident handling
newbie2019
 
PPT
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 
PPT
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
PPT
Data Classification And Loss Prevention
Nicholas Davis
 
Key Concepts for Protecting the Privacy of IBM i Data
Precisely
 
Track 5 session 2 - st dev con 2016 - security iot best practices
ST_World
 
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Precisely
 
Securing Sensitive IBM i Data At-Rest and In-Motion
Precisely
 
Security 101: Protecting Data with Encryption, Tokenization & Anonymization
Precisely
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Trend Micro
 
Data Security Essentials for Cloud Computing - JavaOne 2013
javagroup2006
 
Protecting Sensitive Data (and be PCI Compliant too!)
Security Innovation
 
What Does a Full Featured Security Strategy Look Like?
Precisely
 
Encryption in the enterprise
Bozhidar Bozhanov
 
Cryptography Challenges for Computational Privacy in Public Clouds
Sashank Dara
 
Protect Sensitive Data on Your IBM i (Social Distance Your IBM i/AS400)
Precisely
 
RightScale Webinar: Security Monitoring in the Cloud: How RightScale Does It
RightScale
 
CNIT 160 4e Security Program Management (Part 5)
Sam Bowne
 
CNIT 121: 3 Pre-Incident Preparation
Sam Bowne
 
Material best practices in network security using ethical hacking
Desmond Devendran
 
Chapter 15 incident handling
newbie2019
 
Lecture data classification_and_data_loss_prevention
Nicholas Davis
 
Lecture Data Classification And Data Loss Prevention
Nicholas Davis
 
Data Classification And Loss Prevention
Nicholas Davis
 
Ad

Recently uploaded (20)

PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPT
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Software Development Company | KodekX
KodekX
 
PPTX
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Coupa-Kickoff-Meeting-Template presentai
annapureddyn
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Software Development Company | KodekX
KodekX
 
IoT Sensor Integration 2025 Powering Smart Tech and Industrial Automation.pptx
Rejig Digital
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 

Data Security for Project Managers

  • 1. Alaina Brantner @afterwords_t9n 58th Annual Conference American Translators Association Saturday, October 28th 3:30 PM EST Joseph Wojowski @ferluc666
  • 2. information is beautiful - World's Biggest Data Breaches
  • 3. Overview • Identifying the issues • Qualifying Data Management and Storage Systems • Qualifying Providers • Preventing breaches
  • 4. Identifying the issues • Wording and Marketing • Data collection (cookies) • Third-party add-ons • Mishandling content • Hardware • Passwords
  • 5. Top 500 Passwords: Is yours here?
  • 6. A Proactive Approach to Qualifying Data Management and Storage Systems • When qualifying CMSs, you want to look for: • ISO 27001 Certification for Information Security Management • Encryption
  • 7. History of Encryption • DES key algorithm 56-bit: 256 possible combinations to decrypt data • AES key encryption • AES 128-bit: 2128 • AES 256-bit: 2256
  • 8. Why does this matter? • DES 56-bit Encryption • Using Base 10: ≈1,000,000,000,000,000 • Hypothetical computer checking 1,000,000,000 keys/sec = • 1,000,000,000,000,000 seconds to find the key • 1,000,000,000,000,000 divide out seconds/hour • 1,000,000,000,000,000 divide out hours/day • ≈10 days to recover the key • In real life it could take anywhere from 6 days to a number of hours
  • 9. Why does this matter? • AES 128-bit • 1,000,000,000,000,000,000,000,000,000,000,000,000,000 • 1,000,000,000,000,000,000,000,000,000, 000,000,000,000 • (quadrillion keys/sec = 1 million times faster than they are today) • 1,000,000,000,000,000,000,000,000,000, 000,000,000,000 hours • 1,000,000,000,000,000,000,000,000,000, 000,000,000,000 years • Time to crack key: 1,000,000,000,000,000,000 • Estimated age of Universe: 13,700,000,000 years
  • 10. Why does this matter? • Quantum Computing • Search time taken by square root ≈ million x faster • AES 256-bit: 2256 • 1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,0 00,000,000,000,000,000,000,000,000 • Quantum computation – search taken by square root ≈ million x faster • AES 128 • 1,000,000,000,000,000,000,000,000,000,000,000,000,000 • AES 256 • 1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,0 00,000,000,000,000,000,000,000,000
  • 11. Basic Cryptography • Symmetric Key • Same key used to encrypt and decrypt data • Faster than public key encryption • Needs to be stored securely • Secure channel required to transfer key – telephone
  • 12. Basic Cryptography • Key Encryption • Uses two keys – a public key and a private key • Private key does not need to be transferred • Slower than symmetric key
  • 14. Qualifying Providers • Initial Screening • Non-disclosure and confidentiality agreements • Documentation • Quality assurance systems Data Security Where do you primarily work? (i.e. dedicated office, public space) Do you intend to handle our content over public wifi networks? What email domain do you share content through? How do you store your content? • On the cloud? If so, what service? • Privately hosted server How do you transfer content to any partners? Do you use public machine translation in your work? Have you customized the settings on your router? Do you allow home sharing on your network?
  • 15. Preventing and responding to breaches • Properly vet internal employees and external partners • Deliberately store and transfer content • Strong passwords • Authentication and two-step verification • Encryption • Management plan for responding to breaches • Assessing damages • Corrective action • Documentation • Audits and process improvements
  • 17. Further Reading Wojowski, Joseph. “Data Storage and Security.” 3 Apr. 2015 josephwojowski.wordpress.com Ibid. “Machine Translation Technology and Internet Security.” 3 Apr. 2015 Ibid. “Passwords, Data encryption, and the underutilized file format.” 18 Jan. 2016 Ibid. “The Personal Cloud: your own asteroid in cyberspace.” 30 Jul. 2015 Ibid. “Translation and the Sharing Economy: what’s yours is mine.” 9 Feb. 2016