|
Customer Relationship Management (CRM)
Sam Eldin
- Vision & Architect Brochure 4 CEO
|
|
|
Encryption
The main goal of encryption is keeping outsiders from accessing your data.
The questions are:
•
|
Who are the outsiders?
|
•
|
How do they access your data?
|
Outsiders can be company's employees, governments, operation system vendors, Internet
service providers (ISPs), professional hackers and amateurs. As for how they access
your system, we have to think in the following levels:
•
|
An Internet service providers or Nodes have a copy of any data or transaction running on the internet. Your internet transactions and data are buffered by several of these nodes or anyone has access to these nodes.
|
•
|
You computer motherboard may have a chip that is handing out your computer data to remote sites.
|
•
|
Your own operating system is literally helping itself with everything on your system
|
•
|
Hacker's software installed on your system is helping itself with everything on your system
|
•
|
Employees steeling data from their companies
|
•
|
As for amateurs they make more damages to your system than steeling (virus, ...).
|
•
|
Other unknown methods of steeling data from your system
|
•
|
Sadly, some of these outsiders may have unlimited support (fund, tools, teams, knowledge, ...etc).
|
Looking at the above list, the question is how to stop or slow some if not all
in the above list. Secondly, we need to automate the development of security software
tools that would be economically, easily and frequently built and updated.
Our approach to such issues is as follows:
•
|
Keep everything running in the heap - nesting of methods calls and no static variables.
|
•
|
Save critical information in a secured filing system outside the computer that can be easily disconnected.
|
•
|
Encrypt all the data and the keys used by the data
|
•
|
Encryption software and processes are dynamically loaded and constantly changed
|
•
|
Automation of building security software and updating them to meet new technologies or approaches.
|
•
|
Use mathematical algorithms (puzzles) to increase difficulties of solving such puzzles.
|
•
|
Implementation of both compression and encryption in the same tools.
|
Put it all together:
Compression, Encryption, External Security, Internal Security, Big Data and CRM and The
Size of business are the stone pillars that Big Data is all about. Once you have
data, which we call it the "21 Century Gold", then such data must be stored,
protected, transported and used. Compression, Encryption and Streaming are ways to
use data more efficient and faster. We also have the following security model:
•
|
Beehives
|
•
|
Mapping
|
•
|
XX (the name will give it away) - for Internal Security - keys encryption
|
•
|
Our three compression algorithms
|
We believe that a sold compression, encryption and access security would make security and hacking a thing of the past.
In a nutshell, the best answer is how to make Hackers eat any data they capture. We need to
implement dynamic Encryption that is mathematically very difficult to figure out "What Belongs
to Whom." We would be making it not worth any effort to steel data, since the stolen data can
only be eaten nothing else.
|
|