Everyday cybersecurity practices inadequate among many online consumers

Bitdefender released a report which reveals how consumers across various age groups and socio-demographic backgrounds behave on popular platforms, applications and devices, affecting cybersecurity risk. Findings show basic practices for securing data, … Continue reading Everyday cybersecurity practices inadequate among many online consumers

Is it safe to use a Digital Signature created with a PKI certificate’s private key as a password

I’m trying to create application-layer encryption for user data in my database, using password derivation function. But there is a problem, that there must be an admin user, who can access all user’s encryption keys, for password reset functionality and some other things. I don’t like the fact that all encryption system security can be broken with just one admin password. I’ve asked for an advice here How can I improve the application administrator’s encryption keys security inside database

I was advised to compile an admin encryption key not from a password but from another source (admin computer system information, for example), so it can’t be brute-forced, and then pass it to the database server.

It is a good approach, however, this complicates admin mobility and system recovery in an event of key loss, and these requirements are mandatory to accomplish.

So, I come up with this idea:

  1. Give my admin PKI certificate (RSA 2048 bit for example)
  2. Get some static string (“password” for example)
  3. Make a digital sign out of this static string using the certificate’s private key
  4. Send this digital signature to the database server, and use it there as an encryption key.

At first glance, I don’t see any great flaws with this approach, but I couldn’t find that someone has done anything similar before, so I want to ask you to help me to validate my vision.

Continue reading Is it safe to use a Digital Signature created with a PKI certificate’s private key as a password

How can I improve the application administrator’s encryption keys security inside database

I am interested in the issue of establishing the security of data of users of a web application in the event of a database leak.
It was decided to use the following encryption chain:

User data is encrypted with a user symmetric key (AES)
Continue reading How can I improve the application administrator’s encryption keys security inside database

Cybersecurity best practices lagging, despite people being aware of the risks

The National Cybersecurity Alliance and CybSafe announced the release of a report which polled 2,000 individuals across the U.S. and UK. The report examined key cybersecurity trends, attitudes, and behaviors ahead of Cybersecurity Awareness Month this … Continue reading Cybersecurity best practices lagging, despite people being aware of the risks