Post Top Ad

Showing posts with label Data Security. Show all posts
Showing posts with label Data Security. Show all posts
11:28 AM

Are You Concerned Over Internet Privacy?

by , in

Are You Concerned Over Internet Privacy?

There was an interesting story in the morning papers today coming out of Carbon Hill. Ala.

If regulators approve, residents in Carbon Hill have will no longer be able to sign up for landline-based telephone service. AT&T customers would have to switch to wireless or high-speed Internet phone service.

We are becoming, more and more, an Internet-based society. This may be one of the biggest societal changes since the mass migrations from farm to city a hundred years ago.

But how comfortable are we with that change?

A new survey says, not very.

The TRUSTe 2014 Consumer Confidence Privacy Report is based on an independent online survey of 2,000 American adults. Pollster Harris Interactive conducted it at the end of 2013 on behalf of TRUSTe.

Bottom line: the report concludes that, even though we use the Internet for everything from work to play, we remain nervous about who’s watching us when were online. 

And we’re getting more nervous


An astounding 92% of respondents said they worry about their online privacy. That’s up 3% from last year.

Asked why they’re worried, 58% said they worry about businesses sharing their personal information.

And nearly 50% said they were concerned about having their online behavior tracked so companies could target them with ads and customer-relationship content.

Who's watching us now?


Despite the concerns, there does not seem to be any increased concern about the government peeking at the history files on our browsers. Fewer than 40% of respondents said that the constant media drumbeat over government surveillance programs was a concern.

That’s far less than you’d expect, given the wall-to-wall coverage of the NSA, FISA courts and other programs.

What we don’t know is any long-term harm to online customer relationships as consumer trust in business privacy practices continues to drop.

The good news is there's no more bad news


The good news is that three-quarters of us are now more likely to look for privacy certification on a website, making it more likely we’ll transact business on sites that that meet objective standards for security.

And 70% of those surveyed said that they now feel more confident to manage their online privacy issues. But this is a mixed blessing.

They’re more confident in controlling their privacy because they’re taking steps that reduce their online footprint with businesses. They are now

-83% less likely to click through on online ads

-80% more likely to avoid mobile apps that they think might endanger their privacy

-74% less likely to use location-tracking on their smartphones

The price of progress


In the 1955 play “Inherit the Wind” by Jerome Lawrence and Robert E. Lee, the protagonist, a defense attorney in a 1920s creationism trial, turns to the jury in his summation and notes that "progress has never been a bargain." You have to pay for it. You can have the telephone but "you lose privacy and the charm of distance." Air travel may break the bonds of gravity, but "the birds will lose their wonder and the clouds will smell of gasoline."

The Internet marketplace seems to be like that. It’s Harrods’s, the Encyclopedia Britannica, and the neighborhood multiplex all rolled into one. But for that convenience there’s a price. The price is never being quite certain whether somebody’s lurking around the Internet corner waiting to steal your data.

And it looks like American consumers are still trying to come to grips with that.








7:48 AM

Data Security Takes a "Quantum" Leap

by , in
Data Security Takes a "Quantum" Leap

Cyber warfare. NSA. Data breaches. Americans may be safe from someone’s tank divisions landing in Cape May. But that feeling of security doesn’t necessarily extend to our credit card data, a tech-savvy opponent in an asymmetrical war, an unfriendly government, or even a 30-something gamer living in his mom’s basement.

The fact is that if you have electronic data stored anywhere, eventually someone you don’t want will get his hands on it.

This threat has spawned a cottage data-security industry hawking products that may make you feel better, but not necessarily keep you that much safer.

But now comes word that Battelle Memorial Institute, a non-profit R&D outfit based in Ohio is testing a network built on the mother-of-all anti-hacking technologies. In fact, it’s supposed to be virtually “unhackable”—a sort of Maginot Line for data security.

Battelle is piloting this program with a short network linking its Columbus headquarters with other company facilities in the Columbus suburb of Dublin, about 20 miles away.

The driver of the system is something called “quantum key distribution.” To explain it would take more intelligence than I have and more information than you want. But typical secure data transmission relies on what are called “keys” that are exchanged between the sender and receiver of data so that the encrypted data can be de-encrypted.

Keys are complex mathematical formulas that are pretty tough to break. But the degree of security depends on how much time and computing power a hacker has. It also depends on the value of the data. Obviously a hacker will throw a lot more time and computing power against a system safeguarding battle plans than he will a booklet of your Aunt Tilly’s tarragon recipes.

What makes quantum key distribution scheme different from your garden variety public key encryption is that the sender encodes the key in a single photon—the smallest particle of light. This encoded photon is transmitted through a normal fiber-optic cable to the receiver who uses the key to decode the data.

Since the photon travels at the speed of light, to intercept the key would require a hacker to observe the single photon at exactly the right moment. And even that wouldn’t necessarily work, given quantum mechanics.

Right now the downside of the technology is that it is distance-limited. But Battelle is planning within two years to link its facilities over a 400-mile range.

Right now applications for quantum key distribution appear to be high value data. And the cost can’t be cheap. But most technologies we take for granted now—from computers to air travel—were once thought to be the play toys of the rich. Eventually costs and applications come down with time. Perhaps someday there could be relief for businesses for which current data-security technology has proven inadequate.

The saying in data security is that if you build a ten-foot wall, the hackers will build an eleven-foot ladder. Quantum key distribution adds the element of speed, which may be a new dimension in the security wars.