2. Security Goals Confidentiality Integrity Availability How to Encryption Message Authentication Code, hash function Redundancy 2010 2 BR - Secure and Green
3. Encryption for Confidentiality Must deliver encrypted data as soon as possible Current encryption algorithms (RSA, ECC) are computationally expensive Uses more energy! Not so green 2010 3 BR - Secure and Green
4. More on encryption Must be difficult to break (eg. via brute force attack) “Easier” to use (calculate), but it is still expensive in terms of computational resource usage Thus, high performance computing 2010 BR - Secure and Green 4
5. Green Encryption Must find algorithm that requires less computation to use (but still difficult to attack) Reuse available blocks 2010 5 BR - Secure and Green
6. Integrity Message Authentication Code (MAC) ensures that one bit change in data produces (significantly) different signature Implemented with hash function Hash function (relatively) computationally inexpensive Maybe green? 2010 6 BR - Secure and Green
7. Availability Implemented through redundancy not so green Alternative solution Shared backup / redundant servers through virtualization? 2010 7 BR - Secure and Green
8. Virtual Servers Virtualization, virtual servers, combining several applications into one physical server Use less physical resources, thus green But, … it is more difficult to manage in terms of security [how about cloud computing?] 2010 8 BR - Secure and Green
9. Incident Handling How to make more green Centralized unified threat management (use less servers for logging and analysis) Remote forensic Things that can be done remotely At the last step, bring forensic team (if needed) 2010 9 BR - Secure and Green
10. Final Remarks Still difficult to achieve secure and green 2010 10 BR - Secure and Green