• Latest
  • Trending
  • All
  • Trading & Investing
  • Strategies & Techniques
  • Risk Management & Portfolio Allocation
  • Technical Analysis Tools & Indicators
  • Fundamental Analysis & Research
  • Blockchain Technology
  • DeFi & NFTs
New NCCoE Guide Helps Large Industries Observe Inbound Data While Using Latest Internet Security Protocol

New NCCoE Guide Helps Large Industries Observe Inbound Data While Using Latest Internet Security Protocol

February 14, 2024
X spaces repeat with bluhale

X spaces repeat with bluhale

May 5, 2025
Build Meowverse in Telegram Play-to-Aarn Mini Game

Build Meowverse in Telegram Play-to-Aarn Mini Game

April 4, 2025
What is the future of generative AI?

What is the future of generative AI?

April 1, 2025
How traders stay in front of the curve

How traders stay in front of the curve

March 26, 2025
How to improve crypto investment strategies using AI analysis

How to improve crypto investment strategies using AI analysis

March 23, 2025
Large XRP whale movements are concerned in the midst of Sec Appeal

Large XRP whale movements are concerned in the midst of Sec Appeal

March 21, 2025
Krypto debate raises questions about Warren’s hostile attitude

Krypto debate raises questions about Warren’s hostile attitude

March 8, 2025
Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

March 8, 2025
Bitcoin price forecast – Forbes Advisor Australia

Bitcoin price forecast – Forbes Advisor Australia

March 7, 2025
3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

February 28, 2025
4 Crypto Price Analysis Patforms that can improve your trades

4 Crypto Price Analysis Patforms that can improve your trades

February 28, 2025
From pennies to wealth in the satirical world of tap-to-earn game: interview with bums

From pennies to wealth in the satirical world of tap-to-earn game: interview with bums

February 27, 2025
  • Home
  • Trading & Investing
    • Risk Management & Portfolio Allocation
    • Strategies & Techniques
    • Fundamental Analysis & Research
    • Technical Analysis Tools & Indicators
  • Crypto News & Analysis
    • Bitcoin
    • Market Overview & Trends
    • Altcoins
    • Technical Analysis & Charting
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
  • Blockchain Technology
    • Supply Chain & Logistics Solutions
    • Enterprise Adoption & Applications
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives
Thursday, May 8, 2025
  • Login
UnCirculars
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • Crypto News & Analysis
    • All
    • Adoption & Use Cases
    • Altcoins
    • Bitcoin
    • Market Overview & Trends
    • On-Chain Data & Metrics
    • Security & Scams
    • Technical Analysis & Charting
    X spaces repeat with bluhale

    X spaces repeat with bluhale

    Build Meowverse in Telegram Play-to-Aarn Mini Game

    Build Meowverse in Telegram Play-to-Aarn Mini Game

    What is the future of generative AI?

    What is the future of generative AI?

    How traders stay in front of the curve

    How traders stay in front of the curve

    How to improve crypto investment strategies using AI analysis

    How to improve crypto investment strategies using AI analysis

    Large XRP whale movements are concerned in the midst of Sec Appeal

    Large XRP whale movements are concerned in the midst of Sec Appeal

    Krypto debate raises questions about Warren’s hostile attitude

    Krypto debate raises questions about Warren’s hostile attitude

    Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

    Expert Eyes Bitcoin at $ 750,000 as Fidelity Assigns 1-3%

    Bitcoin price forecast – Forbes Advisor Australia

    Bitcoin price forecast – Forbes Advisor Australia

    3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

    3 Unconnection Statistics Crypto Investors used to detect Bitcoin network activity

    • Bitcoin
    • Altcoins
    • Market Overview & Trends
    • Technical Analysis & Charting
    • On-Chain Data & Metrics
    • Adoption & Use Cases
    • Security & Scams
    • Opinion & Predictions
  • Blockchain Technology
    • Enterprise Adoption & Applications
    • Supply Chain & Logistics Solutions
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives
    • Gaming & Metaverse Infrastructure
    • Web3 Development & Decentralization
    • DAO & Governance Protocols
    • Scalability & Interoperability Solutions
    • Privacy & Security Enhancements
  • Trading & Investing
    • Strategies & Techniques
    • Risk Management & Portfolio Allocation
    • Technical Analysis Tools & Indicators
    • Fundamental Analysis & Research
    • Market Psychology & Sentiment
    • Crypto Tax Implications
    • Institutional Investment Landscape
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
  • Regulation & Policy
    • Global Regulatory Landscape
    • SEC, CFTC, and Government Actions
    • Tax Implications & Reporting
    • KYC/AML Compliance & Standards
    • Institutional Investment Guidelines
    • Central Bank Digital Currencies (CBDCs)
    • Stablecoin Regulation & Oversight
    • Self-Regulatory Organizations (SROs)
  • Security & Scams
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
    • Rug Pulls & Exit Scams
    • Malware & Ransomware Threats:
    • User Education & Best Practices
    • Regulatory Frameworks & Protections
    • Insurance & Recovery Options
  • Community & Culture
    • Crypto Influencers & Thought Leaders
    • Social Media & Online Communities
    • Memes & Internet Culture
    • Crypto Art & Music
    • Events & Conferences
    • Adoption in Developing Countries
  • Opinion & Education
    • Expert Commentaries & Predictions
    • Beginner Guides & Tutorials
    • Glossary of Crypto Terms
    • Research Papers & Whitepapers
    • Podcasts & Video Interviews
    • Book Reviews & Recommendations
No Result
View All Result
UnCirculars
No Result
View All Result
Home Crypto News & Analysis Security & Scams

New NCCoE Guide Helps Large Industries Observe Inbound Data While Using Latest Internet Security Protocol

by Sarah Williams
February 14, 2024
in Security & Scams
0
New NCCoE Guide Helps Large Industries Observe Inbound Data While Using Latest Internet Security Protocol
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter


The Transport Layer Security (TLS) protocol enables us to send data securely over the Internet, and protects passwords and credit card numbers when we provide them to a website. A new practice guide will help industries perform the required monitoring of incoming data for malware while using TLS 1.3, the protocol’s latest version.

Credit:

N. Hanacek/NIST

Companies in large industries such as finance and healthcare must follow best practices to monitor incoming data for cyber attacks. The latest internet security protocol, known as TLS 1.3, offers the latest protection, but complicates the performance of these required data audits. The National Institute of Standards and Technology (NIST) has released a practice guide that describes methods intended to help these industries implement TLS 1.3 and accomplish the required network monitoring and auditing in a safe, secure, and effective manner.

The new draft practice guide, Addressing Visibility Challenges with TLS 1.3 within the Enterprise (NIST Special Publication (SP) 1800-37), was developed over the past several years at the NIST National Cybersecurity Center of Excellence (NCCoE) with the extensive involvement of technology vendors, industry organizations and other stakeholders participating in the Internet Engineering Task Force (IETF). The guidance provides technical methods to help businesses comply with the most up-to-date ways to secure data moving across the public Internet to their internal servers, while at the same time complying with financial industry and other regulations that require continuous monitoring and auditing of this data required. for evidence of malware and other cyber attacks.

“TLS 1.3 is an important encryption tool that brings increased security and will be able to support post-quantum cryptography,” said Cherilyn Pascoe, director of the NCCoE. “This collaborative project focuses on ensuring that organizations can use TLS 1.3 to protect their data while meeting auditing and cybersecurity requirements.”

NIST is requesting public comment on the draft practice guide by April 1, 2024.

The TLS protocol, developed by the IETF in 1996, is an essential component of Internet security: In a web link, when you see the “s” at the end of “https” indicating that the site is secure, it means it that TLS its working. TLS allows us to send data across the vast collection of publicly visible networks we call the Internet with the confidence that no one can see our private information, such as a password or credit card number, when we provide it to a website.

TLS maintains web security by protecting the cryptographic keys that allow authorized users to encrypt and decrypt this private information for secure exchanges, all while preventing unauthorized individuals from using the keys. TLS has been very successful in maintaining Internet security, and its previous updates through TLS 1.2 have allowed organizations to keep these keys on hand long enough to support auditing incoming web traffic for malware and other cyber attack attempts.

However, the most recent iteration – TLS 1.3, released in 2018 – challenged the subset of businesses required by law to perform these audits, because the 1.3 update did not support the tools that the organizations use to access to obtain the keys for monitoring and auditing. purposes. As a result, businesses have raised questions about how to meet enterprise security, operational and regulatory requirements for critical services while using TLS 1.3. That’s where NIST’s new practice guide comes in.

The guide offers six techniques that provide organizations with a method to access the keys while protecting the data from unauthorized access. TLS 1.3 eliminates keys used to protect Internet exchanges as the data is received, but the practice guide’s approaches essentially allow an organization to retain the raw data received and the data in decrypted form long enough to exclude security monitoring to feed. This information is kept in a secure internal server for audit and forensic purposes and is destroyed when the security processing is complete.

Although there are risks associated with storing the keys, even in this restricted environment, NIST has developed the practice guide to demonstrate several secure alternatives to homegrown approaches that may increase these risks.

“NIST is not changing TLS 1.3. But if organizations are going to find a way to hold these keys, we want to provide them with secure methods,” says Murugiah Souppaya of NCCoE, one of the guide’s authors. “We demonstrate to organizations that have this use case how to do it in a secure way. We explain the risk of storing and reusing the keys, and show people how to use them safely, while still staying on top of the latest protocol.”

The NCCoE is developing what will eventually be a five-volume practice guide. Currently available are the first two volumes — the executive summary (SP 1800-37A) and a description of the solution’s implementation (SP 1800-37B). Of the three planned volumes, two (SP 1800-37C and D) will be aimed at IT professionals who need a how-to guide and demonstrations of the solution, while the third (SP 1800-37E) will focus on risk and compliance management will focus , mapping components of the TLS 1.3 visibility architecture to security features in known cybersecurity guidelines.

An FAQ is available to answer common questions. To submit comments on the draft or other questions, contact the practice guide’s authors at applied-crypto-visibility [at] nest.gov (applied-crypto-visibility[at]nest[dot]government). Comments can be submitted until 1 April 2024.

Disclaimer for Uncirculars, with a Touch of Personality:

While we love diving into the exciting world of crypto here at Uncirculars, remember that this post, and all our content, is purely for your information and exploration. Think of it as your crypto compass, pointing you in the right direction to do your own research and make informed decisions.

No legal, tax, investment, or financial advice should be inferred from these pixels. We’re not fortune tellers or stockbrokers, just passionate crypto enthusiasts sharing our knowledge.

And just like that rollercoaster ride in your favorite DeFi protocol, past performance isn’t a guarantee of future thrills. The value of crypto assets can be as unpredictable as a moon landing, so buckle up and do your due diligence before taking the plunge.

Ultimately, any crypto adventure you embark on is yours alone. We’re just happy to be your crypto companion, cheering you on from the sidelines (and maybe sharing some snacks along the way). So research, explore, and remember, with a little knowledge and a lot of curiosity, you can navigate the crypto cosmos like a pro!

UnCirculars – Cutting through the noise, delivering unbiased crypto news

Share196Tweet123
Sarah Williams

Sarah Williams

With years of experience dissecting financial markets, Sarah brings clarity and insight to the ever-evolving crypto landscape. Her engaging prose cuts through the noise, keeping you informed about global trends and breaking news.

UnCirculars

Copyright © 2024 UnCirculars

Navigate Site

  • About Us
  • Advertise
  • Terms of Use
  • Disclaimer
  • Privacy Policy
  • Contact Us

Follow Us

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Trading & Investing
    • Risk Management & Portfolio Allocation
    • Strategies & Techniques
    • Fundamental Analysis & Research
    • Technical Analysis Tools & Indicators
  • Crypto News & Analysis
    • Bitcoin
    • Market Overview & Trends
    • Altcoins
    • Technical Analysis & Charting
  • DeFi & NFTs
    • Decentralized Finance (DeFi)
    • Non-Fungible Tokens (NFTs)
    • Exchange Hacks & Security Breaches
    • Wallet Hacking & Phishing Attacks
  • Blockchain Technology
    • Supply Chain & Logistics Solutions
    • Enterprise Adoption & Applications
    • Healthcare & Medical Innovations
    • Energy & Sustainability Initiatives

Copyright © 2024 UnCirculars