Social media and Quantum key distribution: Difference between pages

From ACT Wiki
(Difference between pages)
Jump to navigationJump to search
imported>Doug Williamson
(Add link.)
 
(Expand quote - source - NCSC - https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies)
 
Line 1: Line 1:
''Information technology''.
''Information technology - cybersecurity.''


Social media are platforms on mobile devices and other computers that host user-generated content and facilitate the development of online social networks.
(QKD).


Examples include Facebook, LinkedIn, Twitter, TikTok, WeChat, Instagram and Tumblr.
"Quantum Key Distribution is a mechanism for agreeing encryption keys between remote parties, relying on the properties of quantum mechanics to ensure that key has not been observed or tampered with in transit.


Since traditional public key cryptography algorithms may be vulnerable to a future large-scale quantum computer, new approaches are required that do not share this vulnerability. QKD claims to offer a potential mitigation since its security properties are based on the laws of physics rather than the hardness of some underlying mathematical problems.


:<span style="color:#4B0082">'''''Social media - reputational risk'''''</span>
QKD protocols provide a mechanism for two remote parties to agree a shared secret key, where the key cannot be observed or tampered with by an adversary without alerting the original parties. However, because QKD protocols do not provide authentication, they are vulnerable to physical man-in-the-middle attacks in which an adversary can agree individual shared secret keys with two parties who believe they are communicating with each other.


:"If, on the other hand, [a] breach is not detected and unauthorised data transmission continues unchecked for several days, the impact of the breach is likely to be much more severe and could domino in either direction along the supply chain.
For this reason, QKD protocols must be deployed alongside cryptographic mechanisms that ensure authentication. These cryptographic mechanisms must also be secure against the quantum threat."


:Sensitive data may be irrecoverable, while rumours percolating on social media may result in adverse media coverage that cannot be controlled. The result: serious damage to the company’s reputation."
''(Source - Quantum security technologies - UK National Cyber Security Centre.)''
 
:''Cyber security: protecting your business and your clients - the Treasurer's Wiki.''




== See also ==
== See also ==
* [[CEO fraud]]
* [[Cryptography]]
* [[Cyber attack]]
* [[Cybersecurity]]
* [[Cyber security: protecting your business and your clients]]
* [[Dual key]]
* [[Financial engineering]]
* [[Encryption]]
* [[Information technology]]
* [[Information technology]]
* [[Platform]]
* [[Key]]
* [[Reputational risk]]
* [[Key Attributes]]
* [[Social engineering]]
* [[Key control indicator]]  (KPI)
* [[Supply chain]]
* [[Key Information Document]]
* [[Key performance indicator]]  (KPI)
* [[Key risk indicator]]  (KPI)
* [[Man-in-the-middle attack]]
* [[National Cyber Security Centre]] (NCSC)
* [[Private key]]
* [[Public]]
* [[Public key ]]
* [[Public key encryption]]
* [[Public key infrastructure]]
* [[Quantum computing]]
* [[RSA encryption]]
* [[Security]]
 
 
==Other resource==
*[https://www.ncsc.gov.uk/whitepaper/quantum-security-technologies Quantum security technologies - UK National Cyber Security Centre]


[[Category:Accounting,_tax_and_regulation]]
[[Category:Identify_and_assess_risks]]
[[Category:The_business_context]]
[[Category:The_business_context]]
[[Category:Accounting,_tax_and_regulation]]
[[Category:Identify_and_assess_risks]]
[[Category:Identify_and_assess_risks]]
[[Category:Manage_risks]]
[[Category:The_business_context]]
[[Category:Risk_frameworks]]
[[Category:Risk_reporting]]
[[Category:Technology]]

Revision as of 01:04, 3 February 2024

Information technology - cybersecurity.

(QKD).

"Quantum Key Distribution is a mechanism for agreeing encryption keys between remote parties, relying on the properties of quantum mechanics to ensure that key has not been observed or tampered with in transit.

Since traditional public key cryptography algorithms may be vulnerable to a future large-scale quantum computer, new approaches are required that do not share this vulnerability. QKD claims to offer a potential mitigation since its security properties are based on the laws of physics rather than the hardness of some underlying mathematical problems.

QKD protocols provide a mechanism for two remote parties to agree a shared secret key, where the key cannot be observed or tampered with by an adversary without alerting the original parties. However, because QKD protocols do not provide authentication, they are vulnerable to physical man-in-the-middle attacks in which an adversary can agree individual shared secret keys with two parties who believe they are communicating with each other.

For this reason, QKD protocols must be deployed alongside cryptographic mechanisms that ensure authentication. These cryptographic mechanisms must also be secure against the quantum threat."

(Source - Quantum security technologies - UK National Cyber Security Centre.)


See also


Other resource