logo
logo
Sign in

Data centre security

avatar
Prithvi Kini
Data centre security

 

                        CURRENT STATE OF DATA SECURITY

The quest for data resiliency

Human civilisation today has come to rely on one thing above all else – data. With the transformative impact of digitisation, all our lives and businesses are inexplicably intertwined with more data than ever before.

This dependency has, however, become the source of our greatest vulnerability. Malicious actors with access to data often manipulate data in a manner that benefit them at the expense of everyone else.

The World Economic Forum has classified cyber-attacks and data theft amongst the most severe and likely threats to our economy and civilisation. Data resiliency has today become an existential quest.

                        The severity of data breaches is growing exponentially

In recent years, as the migration of data to the cloud has increased exponentially, the number of data breaches and the amount of data being compromised has also seen a corresponding increase. The number of organisations that experienced breaches in a year has increased from 21% in 2016* to 36% in 2018*.And as more IOT devices are connected to the internet, the breaches are only stated to increase exponentially.

*Thales (2018). 2018 THALES DATA THREAT REPORT.

                         Grave threats to current fail-safe encryption standards

Almost every security infrastructure known to man is reliant on encryption to keep our data safe. But with tremendous advances in computing power, the emergence of quantum simulators and eventually the migration to quantum computing the encryption infrastructure as we know it today will cease to exist. With encryption gone, our way of life and even human civilisation will alter in ways we cannot even begin to imagine.

RSA & AES are compromised

Powerful algorithms like Shor’s algorithm and Grover’s algorithm running on equally powerful computers are able to crack current encryption standards.

Quantum Simulators

Quantum Simulators use classical computers to simulate the computational power that Quantum Computing brings and is being used to crack current encryption standards.

Quantum Computers

Quantum Computers will render all known encryption. National security cryptographic infrastructure will be compromised and Nation States will face instability. Trust Zones that are the backbone of e-commerce today will be dismantled.

Targeted harvest & decrypt attacks are increasing

With encryption vulnerable to brute force attacks, threat actors are increasingly taking to harvest and decrypt attacks. What makes these attacks possible is the physical susceptibility of our networks. Anyone can today physically tap into the optical fibres and clone the data without raising any alerts. After cloning data and the public keys used to encrypt data, data can be decrypted at a later date without raising any suspicion.

With so much at stake, we at QNu questioned everything we know about current data security paradigms. What we found was that the reliance on mathematics-based encryption to keep our data safe were based on the assumption that computing power would never pose a threat to it.

                           PRODUCTS & SOLUTIONS

Unconditional
security

We help innovators, disrupt existing security paradigms by accelerating their transition to deploy Quantum-safe encryptions. Let’s protect what we value most – data.

collect
0
avatar
Prithvi Kini
guide
Zupyak is the world’s largest content marketing community, with over 400 000 members and 3 million articles. Explore and get your content discovered.
Read more