Sam Eldin
Customer Relationship Management (CRM)
Sam Eldin
- Vision & Architect Brochure 4 CEO

Home The Future Big Data CRM End-to-End Intelligence Post Office
Executive Summary Investors Business Plan Marketing Compression Encryption Data Streaming Business Intelligence
Encryption
The main goal of encryption is keeping outsiders from accessing your data.

Data Compression

The questions are:

Who are the outsiders?
How do they access your data?

Outsiders can be company's employees, governments, operation system vendors, Internet service providers (ISPs), professional hackers and amateurs. As for how they access your system, we have to think in the following levels:

An Internet service providers or Nodes have a copy of any data or transaction running on the internet. Your internet transactions and data are buffered by several of these nodes or anyone has access to these nodes.
You computer motherboard may have a chip that is handing out your computer data to remote sites.
Your own operating system is literally helping itself with everything on your system
Hacker's software installed on your system is helping itself with everything on your system
Employees steeling data from their companies
As for amateurs they make more damages to your system than steeling (virus, ...).
Other unknown methods of steeling data from your system
Sadly, some of these outsiders may have unlimited support (fund, tools, teams, knowledge, ...etc).

Looking at the above list, the question is how to stop or slow some if not all in the above list. Secondly, we need to automate the development of security software tools that would be economically, easily and frequently built and updated.

Our approach to such issues is as follows:

Keep everything running in the heap - nesting of methods calls and no static variables.
Save critical information in a secured filing system outside the computer that can be easily disconnected.
Encrypt all the data and the keys used by the data
Encryption software and processes are dynamically loaded and constantly changed
Automation of building security software and updating them to meet new technologies or approaches.
Use mathematical algorithms (puzzles) to increase difficulties of solving such puzzles.
Implementation of both compression and encryption in the same tools.

Put it all together:
Compression, Encryption, External Security, Internal Security, Big Data and CRM and The Size of business are the stone pillars that Big Data is all about. Once you have data, which we call it the "21 Century Gold", then such data must be stored, protected, transported and used. Compression, Encryption and Streaming are ways to use data more efficient and faster. We also have the following security model:

Beehives
Mapping
XX (the name will give it away) - for Internal Security - keys encryption
Our three compression algorithms

We believe that a sold compression, encryption and access security would make security and hacking a thing of the past.

In a nutshell, the best answer is how to make Hackers eat any data they capture. We need to implement dynamic Encryption that is mathematically very difficult to figure out "What Belongs to Whom." We would be making it not worth any effort to steel data, since the stolen data can only be eaten nothing else.


Next Generation


Clients


Data
Integration Sales Cloud
Questions Answers Videos Contact us