Top
Avoid the Encrypted Shadow Monster: A Look at Decryption and ‘Stranger Things’ – ANITH
fade
124075
post-template-default,single,single-post,postid-124075,single-format-standard,eltd-core-1.1.1,flow child-child-ver-1.0.0,flow-ver-1.3.6,eltd-smooth-scroll,eltd-smooth-page-transitions,ajax,eltd-blog-installed,page-template-blog-standard,eltd-header-standard,eltd-fixed-on-scroll,eltd-default-mobile-header,eltd-sticky-up-mobile-header,eltd-dropdown-default,wpb-js-composer js-comp-ver-5.0.1,vc_responsive

Avoid the Encrypted Shadow Monster: A Look at Decryption and ‘Stranger Things’

Avoid the Encrypted Shadow Monster: A Look at Decryption and ‘Stranger Things’


The popular Netflix series “Stranger Things” – with all of its nods to 80’s sci-fi and nostalgia – is based on the premise that there are two parallel realities: the real world and “the upside down” and evil inverted world inhabited by monsters. And while the technology of “Stranger Things” doesn’t stray far from arcade games, TV antennas and Walkman portable radios, there’s a connection to modern cyberthreats that can’t be ignored. On the internet there are hidden threats that creep underground in a sort of inverted world, hidden from the naked eye. These threats are secreted in encrypted traffic.

According to industry experts, about 70 percent of internet traffic is encrypted. On the surface, this may not seem surprising, but it can be downright frightening when you consider that most security devices cannot inspect decrypted traffic. Similar to how only a few in “Stranger Things” can actually see the upside down, we have very little visibility into what’s happening on our own networks.

There’s a Shadow Monster potentially lurking in encrypted traffic, and failure to see it opens the door to potential problems such as financial loss, reputation damage and exposure of intellectual property and confidential customer data. In a recent survey, it was discovered that seven out of 10 IT professionals assumed their companies had suffered at least one data leak. Meanwhile, according to a Ponemon Institute study, over 40 percent of all cyber attacks escape security by hiding in encrypted traffic.

This has led many companies to invest in myriad cybersecurity point product in their quest to keep the shadow monster away, but most of these solutions simply cannot break and inspect encrypted traffic, meaning they lack the ability to see the two parallel worlds. This lack of inspection is the open door for anyone to pass traffic from one world to another. It’s like putting a steel door in front of your company and forgetting that the back door does not lock.

At the same time, performing decryption on traditional security solutions can degrade performance and force additional investments to counteract it.

Safe traffic

Allowing encrypted traffic to flow freely means you are not scanning files that pass through your network. These files could contain malware and ransomware which can infect your network and applications.

For example, many companies invest a large percentage of their network security budget on next-generation firewalls, intrusion detection and prevention systems, secure web gateways and similar devices. Thus, the investment made in these network devices is wasted if they can’t decrypt and inspect traffic.

In Stranger Things, the Hawkins City National Laboratory tries to create a perimeter for monsters – but leaves portals open in the woods, at school or anywhere else in the city. This is similar to other security devices that don’t break and inspect encrypted traffic- if they’re are not inspecting 70 percent of the traffic that is traversing your network, these devices are not doing their job and you’re putting yourself at risk.

Don’t allow a shadow monster cloak itself in encryption to get into your network and avoid the upside down with dedicated decryption that won’t impact performance and will preserve your existing security investment.

window.___gcfg = {lang: ‘en-US’};
(function(w, d, s) {
function go(){
var js, fjs = d.getElementsByTagName(s)[0], load = function(url, id) {
if (d.getElementById(id)) {return;}
js = d.createElement(s); js.src = url; js.id = id;
fjs.parentNode.insertBefore(js, fjs);
};
load(‘//connect.facebook.net/en/all.js#xfbml=1’, ‘fbjssdk’);
load(‘https://apis.google.com/js/plusone.js’, ‘gplus1js’);
load(‘//platform.twitter.com/widgets.js’, ‘tweetjs’);
}
if (w.addEventListener) { w.addEventListener(“load”, go, false); }
else if (w.attachEvent) { w.attachEvent(“onload”,go); }
}(window, document, ‘script’));

window.___gcfg = {lang: ‘en-US’};
(function(w, d, s) {
function go(){
var js, fjs = d.getElementsByTagName(s)[0], load = function(url, id) {
if (d.getElementById(id)) {return;}
js = d.createElement(s); js.src = url; js.id = id;
fjs.parentNode.insertBefore(js, fjs);
};
load(‘//connect.facebook.net/en/all.js#xfbml=1’, ‘fbjssdk’);
load(‘https://apis.google.com/js/plusone.js’, ‘gplus1js’);
load(‘//platform.twitter.com/widgets.js’, ‘tweetjs’);
}
if (w.addEventListener) { w.addEventListener(“load”, go, false); }
else if (w.attachEvent) { w.attachEvent(“onload”,go); }
}(window, document, ‘script’));



Source link

Anith Gopal
No Comments

Post a Comment

three × three =

This site uses Akismet to reduce spam. Learn how your comment data is processed.