1 / 3

IT advisory services | SOC Assurance

SOC is a boutique alternative for IT advisory services, Cyber security audit Edmonton, Penetration Testing, security awareness Training. For more information visit the website.

Download Presentation

IT advisory services | SOC Assurance

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Road lying Ahead... Quantum Computing and its impact on Information Security The computers are arguably the single most valuable invention in the modern history, acting as the vehicle and catalyst for growth in almost every industry from automotive to zinc mining, computers have helped us achieve the impossible and to march beyond. And all this achievements and accomplishments were fundamentally derived from just two numbers, 1 and 0. Ironically computers are have evolved with time but there fundamentals remained the same, all computers worked with 1s and 0s has their base mod of operation since their conception. The evolutions made in this field is purely how fast we can manipulate and calculate using those two constants, but after half a century from its conception finally a fundamental change is introduced to the world of computing and computation at molecular level, literally(in-fact at a smaller scale than that) this revolutionary technology is known as quantum computing. The Origin, Computers have always used 1s and 0s as the fundamental blocks, as we combined 1s and 0s with some logic gate (AND, OR, XOR ,etc.) to produce expected results and by using the expected results we achieved various automations. So, quantum computer introduces the concept of quantum bits known as qubit. In addition to 1 and 0 quantum computing has qubit. Qubit is a state of bit in a superposition where the bit can either be 1 or 0. Which introduces another level of complexity which provides us more path to achieve results. This increases the computation power exponentially. This is a very (and I stress on very) High level explanation of Computing. The Problem, Even though quantum computers are not commercially available and are prices astronomically, with absurd environmental restrictions like intense cooling required (liquid nitrogen is usually used) and are massive compared to traditional personal computer, but all this was true of the computers in the past. If we have something to learn from the History books the quantum computer will be an actual commercial product down the road. And there is where the problem lies, the quantum computers are not just faster compared to traditional computers but exponentially fast, its like comparing the first automotive ever build to millennium falcon in hyperjump. We use technology so much but, how many times have you thought about the cogs moving which makes the magic happen, and quantum computer is going to disrupt those cogs in a massive manner, but I want to focus on the security aspects of quantum computer.

  2. Encryption is used almost ubiquitously to secure data at rest or at transit, while you are doing your banking, social media, emails, or even secure texting apps (like WhatsApp). Encryption is a technique of making your data unreadable until you have the key to make it readable again. And these keys are literally the key behind the strength of an encryption. Computers are capable of guessing the keys by starting 1 to the key itself, but the problem for the computer and good news for keeping our data secure, contemporary computers are not capable of decrypting the encryption in a reasonable time (if 1 trillion years is reasonable then go for it). This restriction is imposed by the computational prowess of a computer. And that restriction is easily resolved by quantum computers, the quantum computer can easily break the contemporary cryptographic techniques in matters of minutes or hours. Thus, breaking the entire security model imposed on the internet or any device. The Recommendation, It is more of an insight to the solution for the impending quantum computing threat to cryptography, even though quantum computers are still in there initial phases of development, the scientific community has taken the threat to cryptography very seriously, and have already started working on cryptographic techniques for example quantum independent devices and quantum key distribution, which would utilize the power of quantum computers to secure our data. This would be the next evolutionary step in the world of cryptography. The Takeaway, The world of information security was, is and will always be a arms race, the technology would keep on growing and each side would keep on adapting to it to attack and defend. It seems that the next stage for battle for information security is the quantum realm, and to keep yourself up to date with information security and all its battles visit us at www.savassociates.ca www.socassurance.ca About SAV SAV is a full-service CPA Firm (Accounting, Tax, Consulting and Cyber Advisory), with offices in Toronto, Ontario and Edmonton, Alberta. SAV was established in 2013 and is licensed to Practice Accounting in Ontario and Alberta. SAV is a boutique alternative for IT advisory services, assurance, accounting, tax, and business consulting needs. SAV provides wide spectrum of services including but not limited to audit, reviews, tax services, risk advisory services, IT advisory services to small and medium sized businesses. SAV specializes in providing consulting & professional services with a unique focus on Information Security Advisory including Threat Risk Assessment, Vulnerability

  3. Assessment and Penetration Testing, SOC1, SOC2, and Cyber Security Audits, Risk Management and Compliance, Business Consulting and Advisory Services, Accounting Advisory Services, Financial Statement Audits, Business and Personal Taxes Our consulting team and associates have extensive experience undertaking complex security assessments and implementation within private and government sectors. SAV currently has a team of 10 members which includes 2 Partners and 8 staff members. We have an impeccable record of delivering on time and on-budget and exceeding our clients’ expectations. We are proud to say we have substantial client reengagement during our history. Our commitment to building our brand is to ensure we maintain long term relationships with the clients with our investment in our experience, services, and independence. [PUBLISHED: 2020]

More Related