What can I encrypt?
This method is used when the data sender doesn’t control the path all the way to the receiver, often seen in e-commerce transactions. The use of Secured Socket Layer (SSL) eases the establishment of encryption for the communication session between the end-user and the e-commerce web page. If a user needs end-to-end protection of data, measures must be taken to keep that data secure in all three states: at rest, in use, and in motion.²
Encryption in Transit
The Transport Layer Security (TLS) protocol, Secure Sockets Layer (SSL) protocol, and the Private Communications Transport (PCT) protocol are based on public key cryptography. The Security Channel (Schannel) authentication protocol suite provides these protocols and uses a client/server model. In the authentication process, the TLS client sends a message to the TLS server, and the server responds with the information that the server needs to authenticate itself.
The client and server then perform an additional exchange of session keys, and the authentication dialog ends. When authentication is completed, SSL-secured communication can begin between the server and the client using the symmetric encryption keys that are established during the authentication process.³
TLS secures transmitted data using encryption, authenticates server, authenticates clients (optional) to prove the identities of parties engaged in secure communication, and provides data integrity through an integrity check value. It can be used to protect against masquerade attacks, man-in-the-middle or bucket brigade attacks, rollback attacks, and replay attacks. TLS works with most Web browsers and it often integrated in news readers, LDAP servers, and a variety of other applications. It provides options for the authentication mechanisms, encryption algorithms, and hashing algorithms that are used during the secure session.
A Virtual Private Network (VPN) is designed to provide a secure, encrypted tunnel in a public network. Data is transmitted between the remote user and the organisation’s network using this secure, encrypted tunnel. An IPsec-based VPN encrypts traffic between end points and can protect against eavesdropping, man-in-the-middle, and denial-of-service (DoS) attacks. Initially VPNs were set up using dedicated VPN hardware, beneficial for environments that were static and when hosts were on the same network.
Today, software firewalls and VPN virtual appliances are the more common solutions to these problems. They offer significant cost savings over hardware appliances and can be scaled up by new virtual instances. Virtualised VPN appliances, however, may share resources with other VMs and availability may be affected during peak loads.4
Encryption at rest
Transparent encryption, also known as On-The-Fly Encryption (OTFE), is used by some disk encryption software and automatically encrypts or decrypts data that is saved in the hard drive. The files in encrypted disk are accessible only through using the correct key.5
Encryption in use
1A First Data White Paper A Primer on Payment Security Technologies: Encryption and Tokenization: https://files.firstdata.com/downloads/thought-leadership/primer-on-payment-security-technologies.pdf
2Best Practices: Securing Data at Rest, in Use, and in Motion: https://www.datamotion.com/2015/12/best-practices-securing-data-at-rest-in-use-and-in-motion/
3What is TLS/SSL?: https://technet.microsoft.com/en-au/library/cc784450(v=ws.10).aspx
4Securing Data in Transit: https://cdn2.hubspot.net/hub/407749/file-2454417150-pdf/Downloads/WP_Securing_Data_in_Transit.pdf?t=1452903009655
5TrueCrypt User’s Guide: https://www.grc.com/misc/truecrypt/TrueCrypt%20User%20Guide.pdf