Here is a brief description of the two approaches. Temporarily decrypting the data is not necessary. Encrypted traffic analysis is another way of analysing encrypted traffic. SSL/TLS inspection enables companies to decrypt encrypted data traffic, classify it and check it. The two largest obstacles to the decryption of network traffic via SSL inspection are the fear of infringing data protection legislation (36 per cent) and concerns about reduced performance (29 per cent). Although 99 per cent of the IT managers questioned regard encrypted network traffic as a source of security risks, two thirds of the companies fail to protect their assets from internal and external threats which misuse the SSL/TLS. This is highlighted in a study by Flowmon and IDG Connect. Many companies don’t analyse encrypted traffic – or don’t analyse it sufficiently. Analysing encrypted trafficīut this is frequently not the case. To prevent catastrophic consequences, companies ought to analyse this encrypted data traffic, so that no malware enters their network and, in addition, that no propriety data exits the network unchecked. As a matter of principle, if companies can’t see what’s entering their network, they can’t protect themselves against it. In this encapsulated form, it is very difficult for the companies being attacked to recognise the malware. Many hackers use SSL/TLS to hide their activities and movements in the network, and to attack systems or applications with malware they have smuggled in unnoticed. According to Mozilla’s telemetry data, 70 percent of all websites currently use SSL encryption – recognisable by the padlock in the corner of the browser or the ”https” in the internet address.īut encryption also offers new possibilities for the “dark side”. This is an increase of around 20 per cent compared to the previous three years. In “Market Radar: Next-Generation Firewall Platforms, January 2020”, the analysts at Omdia estimate that, in today’s companies, 70 to 80 per cent of incoming network traffic is encrypted. The TLS (Transport Layer Security) protocol is generally used for this purpose, also known under its previous designation, SSL (Secure Sockets Layer). In the age of the internet and the cloud, there is one central security measure – encryption of the data stored in the cloud and of the data while it is being transmitted. These enable companies to examine encrypted data transmissions for malware. Methods such as SSL/TLS inspection or encrypted traffic analysis offer a potential remedy. The problem: hackers are also using encryption to smuggle harmful malware past the network defence systems unnoticed. Nowadays, most of the data traffic on the internet is encrypted for information security and protection.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |