18.05.2021 Views

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.

Cyber Defense Magazine Special Annual Edition for RSA Conference 2021 - the INFOSEC community's largest, most popular cybersecurity event in the world. Hosted every year in beautiful and sunny San Francisco, California, USA. This year, post COVID-19, virtually with #RESILIENCE! In addition, we're in our 9th year of the prestigious Global InfoSec Awards. This is a must read source for all things infosec.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Evitoken Technology A New Way to<br />

Keep Secrets and Pass Them On<br />

By Fabrice Crasnier, director of Research & Development department of<br />

FREEMINDTRONIC<br />

Controlling the confidentiality of in<strong>for</strong>mation is now an absolute necessity, as there are so many cyber<br />

malicious acts. We can cite among others acts such as phishing, stalking or ransomware. These socalled<br />

"cyber" threats alone represent approximately 75% of the infiltration techniques giving access to<br />

your confidential or personal data. All of these techniques have the same approach, which is identity<br />

theft. This mechanism allows an individual, or a machine, to impersonate someone or something else.<br />

The recipient thus deceived, lifts his natural mistrust to trust this ill-intentioned sender.<br />

Protection techniques <strong>for</strong> transmitting confidential or personal data have been around <strong>for</strong> a very long<br />

time, as have signature mechanisms. They are most often based on asymmetric key algorithms, with<br />

strong encryption (<strong>RSA</strong> of 2048 or 4096 bits or even ECDSA). Un<strong>for</strong>tunately, if the model on which these<br />

encryption techniques are based is proven and ensures flawless security, its IT implementation is, <strong>for</strong> its<br />

95

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!