Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Is Free Encryption Worth It?
Is encryption worth the headache when using the public cloud?

While in constant debate over data encryption and ease of access, I encountered a train of thought that made my jaw drop. A tradeshow attendee suggested encrypting everything, but just use a weak algorithm; so as not to make it impossible to decode if needed in the future.

Before smirking and quoting statistics as truth, I stopped to ponder: was there any merit to the statement, what was the sensitivity level of the data, where was it being stored, who had access to it, what was the definition of a weak algorithm, was this archival data or was it accessed and changed often?

Through conversation, the premise was potentially plausible (with some big question marks), but the logic was still thoroughly flawed. Yes, the data was constantly changing and only updated records were being sent to branch offices via a public cloud file sharing service, but the data did contain personally identifiable information. The last time I checked, people do not change their social security numbers very often and data captured by an intruder will stay in its captured state.

The attendee’s second concern was that using ciphers based on strong algorithms, would cause a load on older hardware. I wondered if a breach cost more than updating old hardware, apparently not. A weak algorithm using a public or private cipher, translates to cracked passwords or credentials. The Enigma code kept the Allies busy for a while, but it was cracked; just like WEP, MD5, and earlier versions of SSL today.

A company knowingly cannot use ciphers that can be compromised as their font-line (in this case only line) of defense. If this person was concerned about product and server upgrade costs; use one of the free encryption applications that use strong and proven algorithms. Many applications and operating systems have open source cousins and so do many widely used encryption algorithms. Many of them are easier to use than a licensed copy and they have a small footprint.

The latest completely free encryption application I found and have begun using exclusively is based on the PGP algorithm, provides numerous options for cipher strength, and is fast and nimble. Another great thing about GoAnywhere OpenPGP Studio is that it runs on Mac OS X, Windows, and Linux.

Final analysis - If your company has chosen to “standardize on the cloud,” be safe and make sure anything you put up there is still yours when you pull it back down.

About Dirk Zwart
Born in Canada and calling Nebraska home, Dirk primarily writes on the Technical side of the IT realm. Having written for years at Gateway Computer and as part of other large IT organizations, Dirk happily writes for Linoma Software. When not writing children's stories or stage scripts, you'll find Dirk out back in the vegetable garden or building yet another server for reasons unknown. Follow Dirk on Twitter, Facebook, or LinkedIn.

Latest Cloud Developer Stories
Automation is turning manual or repetitive IT tasks into a thing of the past-including in the datacenter. Nutanix not only provides a world-class user interface, but also a comprehensive set of APIs to allow the automation of provisioning, data collection, and other tasks. In thi...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileg...
Organize your corporate travel faster, at lower cost. Hotailors is a next-gen AI-powered travel platform. What is Hotailors? Hotailors is a platform for organising business travels that grants access to the best real-time offers from 2.000.000+ hotels and 700+ airlines in ...
Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
Most Read This Week
ADS BY GOOGLE