Information Data Security Consultants

With experience across financial, commercial and government sectors, we can provide security consultancy support, advice and guidance to help keep your business information and data safe from cyber attacks.

With a pragmatic approach to data risk, security and compliance we are fully versed with technology solutions that will address data security threats that could greatly affect your business.

Data Security Axioms

Classical data security is based around three concepts: Confidentiality, Integrity and Availability or CIA for short. To use these concepts there are three important axioms:

Here is our first axiom - you cannot have perfect security it just needs to be fit for purpose (Everett's hypothesis)

The second axiom is close behind - Always assume your opponent knows your cryptographic algorithm and method, to break the cipher you must know the secret key (Kerchoffs's principle). This is why you want to store secret keys in tamper resistant modules

And the third axiom - The only way to assess the strength of a cryptographic algorithm is extensive peer (and practically that means public) revue, do not use untried and untested new algorithms, also don't be fooled by algorithms with long keys, it's the effective length of the key that matters which may not be the same thing.

Data Confidentiality

Confidentiality as it says is the requirement to prevent an unauthorised person from reading the sensitive data.

A suitable cryptographic algorithm is applied to the data such that without knowing the key it is not possible to decode the data.

What we mean is that it is not economically viable to break the crypto algorithm. In security nothing is impossible it's hopefully just not practical.

It is really important to appreciate that you cannot protect the integrity of a document using a confidentiality mechanism.

Data Integrity

Integrity is all about detecting an unauthorised modification to the data.

You cannot prevent data being modified or even deleted but you must detect that the data has been changed.

This is achieved by applying a suitable data integrity function. This is done by using a cryptographic algorithm to create a digest of the data message.

The ideal function would be such that a 1 bit change would be always detected and it shouldn't be practical to construct a different message with the same digest.

Data Availability

Availability is not a direct cryptographic issue but in any security design it is fundamental.

Apart from disaster recovery you must ensure that an attacker cannot block access to the data or be able to delete the data.

The underlying mechanism behind this is access control and common practice would be to use cryptographic techniques to authenticate the authorised users of the data.

Typically a challenge response mechanism would be used where the verifier challenges the prover to encipher a provided random number.

So how can we help you?
Do you need to implement more improved security practises into your IT environment? We can help you on the best way forward to manage your information risk, security and compliance.
We can provide
Access Control System Development
Database Management Development
Communication & Network Security Development
Time Stamping Application Development
Hardware Security Application Development
Digital Signature Application Development

GET IN TOUCH

We can provide expert advice on how to manage your information risk, security and compliance.

Call +44 (0)1903 723 548 or email us at  

CONTACT US

+44 (0) 1903 723 548
+44 (0) 1903 734 975



Microexpert Limited
Gratwicke House
10 East Street
Littlehampton
West Sussex
BN17 6AW, UK

© 2018 Microexpert. Registered number 01755695.

Search

line-height: 180%;