Security Impact data encryption for the NSA on cloud computing is a hard truth

Source: Internet
Author: User
Keywords For monitoring impact cloud computing security NSA

The annual RSA Conference, one of the most influential industry events in the information security community, has been held in the United States recently. At the RSA Conference, the events of the information world in this year were interpreted, and of course, the Snowden incident that erupted last year became the main topic.

People concerned about information security must be aware of the meaning of the five-word "Snowden incident". Last year, the US National Security Agency's former employee, Snowden, exposed the NSA's surveillance scandal, beginning with a series of incidents such as surveillance and interception of information. The emergence of these events has led the United States to gradually lose the trust of other governments.

At this year's RSA information security conference, Richard, a counterterrorism expert, gave a speech to the NSA, pointing out that the U.S. National Security Service is good at gathering intelligence and has the potential to create a police surveillance country that never shuts down.

Clark used to be a national coordinator for security, infrastructure protection and counterterrorism in the United States, and served as President of the United States Presidential advisor as early as Reagan. Since many countries in the world have such monitoring techniques, the task of controlling these technologies is more important than the technology itself. Among them, he also pointed out that the U.S. National Security Agency for cloud computing security has 10 major impact.

NSA's 10 big impact on cloud computing security

1. There is no link between policy makers and their desire to gather information and the actual collection of information. If they want to gather intelligence, they will take all the means they can think of to gather information. Senior decision-makers must be very specific about what information they want to collect and what they need, and what they don't allow us to collect. Mr Obama's response is that our ability to collect such information does not mean that we should collect such information.

2. The United States National Security Service has done a good job of attacking, but it is very bad at the security of its own network. The lesson here is that it's a good record when you say you want to use perimeter defense mode. However, you have to implement this defensive mode, but also to increase the good internal security.

3. U.S. companies are losing market share in Europe, the Middle East and north and south, as a result of the US National Security Agency's surveillance scandal. This is the result of public policy mistakes.

4. One reason for the decline in U.S. market share is that non-companies use the NSA's surveillance scandal as a marketing tool. Some Asian companies say they do not buy American products because the NSA may install eavesdropping devices in those products.

5. Governments around the world, especially European governments, are using the U.S. National Security Agency's surveillance scandal to spread the concept of data localization.

6. Any real solution that concerns the database and cloud services being hacked by hackers has nothing to do with the location of the server, and the correct solution is to encrypt the content in the cloud.

7. To effectively protect data security, users need to encrypt data in the process of data transmission, use and storage. This means that the encryption standard must be trustworthy.

8. The United States Government should notify everyone immediately of the discovery and knowledge of the security vulnerabilities of 0. This should be a general policy. But the United States government has not done so.

9. If we implement information democracy, we need a strong and independent regulatory Commission on privacy and civil liberties. This committee has the right to see everything.

10. These issues are not a concern for the United States. Clark says the United States is not the only country to implement surveillance. We are just the best countries to date. We need some international standards. The U.S. government says it does not attack the country's financial system. This is a good starting point.

Responding to NSA cloud computing security Impact data encryption remains a well-deserved

The US Security Council is mired in public opinion, although the United States is not the only country to monitor, but Hotta, the exposure of the monitoring scandal has indeed made people really feel the threat to other countries and many companies, so that many governments pay attention to the development of autonomous systems, The establishment of an isolated network system with the United States. These projects are established and implemented for the purpose of guaranteeing national information security.

Want information security, the most essential is the data itself security, data encryption for the data to expand Security shield, even if the malicious attack or steal, encryption technology can still function on the data objects, protect the information does not cause leakage. And the international advanced Multimode encryption technology is able to provide a variety of different encryption modes in different working environments, flexible and targeted. In addition, multimode encryption technology is the core technology of SHANLI waterproof wall data leak-proof system, which provides a powerful help for data leakage prevention.

Shanli Network to comply with the trend of information security era, the introduction of encryption technology 3.0--MULTIMODE encryption technology, as the core to create a representative product mountain waterproof wall data leak-proof system. The system through the "dual-core double-rise" technology update, not only has the function of file encryption, for enterprise internal confidential documents, enterprise outsourcing files, as well as file rights control characteristics. Shanli Waterproof Wall Data leak-proof system in the use of its unique AUF monitoring core and the international Advanced Encryption algorithm, it includes the mature computer terminal management mode, through equipment asset management, port management, media management, external management, desktop management, remote management, can achieve the management effect of technical means after system implementation.

The emergence of the NSA incident has also become an opportunity for other countries to vigorously develop network communications technology, in order to ensure the country's information security, the development of their own communications network is the hard truth. And at present, in the United States still rely on the technology of the major technical support, to prevent the disclosure of important information, the use of targeted encryption software to protect the source data security is the best choice!

(Responsible editor: Lu Guang)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.