Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Podcasts
    • Photo Galleries
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

To encrypt or not to encrypt — That is the question

By Yuval Khalifa
metrics-cyber-freepik1170.jpg

Image via Freepik

December 7, 2022

Encryption is a double-edged sword. It allows us, as users, to gain better privacy which enables us to keep the things we do, the identities of whom we do it with — to ourselves. At the same time, it allows attackers to remain stealthy and hidden from our detection mechanisms.


The Privacy vs. Responsibility Problem

Some organizations mitigate that by getting all their employees to sign a legal document allowing their cybersecurity team to decrypt all their internet activity (some limit this by intentionally excluding certain common medical or financial websites). This approach suffers from two main flaws. 

First and foremost, it can only be applied to some types of encrypted connections but not others, as explained later, so it doesn’t allow the defenders to see into all encrypted connections. More importantly, such organizations deliberately and intentionally harm the privacy of their employees in the name of improving the organization’s cybersecurity posture.

Secondly, decrypting such traffic is technologically complex and forces the organization to accept responsibility for the decrypted data. These reasons cause organizations to either not inspect it thoroughly or at all. Organizations are neglecting their responsibility for the safety of their data and their organization’s business continuity, and by extension — the financial future of all of their employees.

However, there is a third way. For that, we’ll need to dive into some details on two of the most widely used encryption protocols and how they work.


TLS and SSL and why they’re important

TLS and SSL operate at the transport layer of TCP/IP and are often used to secure protocols such as HTTP (by using HTTPS), FTP (by using FTPS), and more. This protocol allows network administrators to configure their network so that their routing device can function as a “Man-In-The-Middle.” This allows the routing device to decrypt and inspect the traffic before letting it proceed as intended.

Another critical development in TLS is PFS, or “Perfect Forward Secrecy.” This is a TLS feature that, if used, will replace the encryption keys used for the connection during the connection by using the Diffie-Hellman algorithm. This will prevent traffic listeners, such as passive traffic analyzers or eavesdroppers from being able to decrypt the traffic even if they have access to the server’s private key.


But it’s more difficult to Man-In-The-Middle SSH

SSH, or Secure Shell, was developed to manage servers by sending commands and receiving their output via a secure channel. It also allows the use of a tunneling mechanism for other protocols. Unlike TLS, it doesn’t allow network administrators to configure their network so their routing device can function as a “Man-In-The-Middle.” That means that if network administrators allow outgoing SSH traffic from their organization to the internet, their users can tunnel through SSH.


Metadata and context instead of decryption

So, now that we know how these protocols work, I’d like to suggest a different approach to handling encrypted communications: It is true, of course, that the malicious payload is encrypted. However, we can look at the encrypted data and fully understand if it is malicious or not by analyzing valuable metadata and specific protocol properties as well as relying on anomaly detection.


How Metadata analysis can be used

SSH uses smaller packets for login attempts than those used to send commands, receive output, or transmit files. That fact allows tools to automatically detect brute force attempts and password guessing in SSH even without decrypting the traffic. Another example includes the number of TLS certificate issuers used in connections, especially from servers, which is relatively small. So a TLS connection using a new certificate issuer that hasn’t been seen in the past month in that organization is probably a good indicator of something wrong. 

A third example, most often (especially on Linux), a TLS connection will usually start with a DNS query to the domain name used, especially on Linux. This, in many cases, will be enough to detect DNS anomalies, such as the number of unique DNS queries to the same parent domain or the DNS connection duration. They are very good indications of malicious activity if they are abnormal based on the baseline in that particular environment. 


Final Thoughts

All of the above and much more can be done without decrypting the traffic, violating the employees’ right to privacy, and still allowing cybersecurity defenders an excellent chance to catch the potential adversary.

KEYWORDS: cyber security encryption privacy risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Yuval Khalifa is Chief Security Architect at Coralogix.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security-strategy-fp1170v270.jpg

    To bear arms or not to bear arms — That is not the question

    See More
  • apple security

    Apple to encrypt iCloud backups to boost security & privacy

    See More
  • Healthcare Data Compliance: Maintaining Integrity, Privacy and Security

    Research Center's Failure to Encrypt Mobile Devices Leads to $3 Million HIPAA Settlement

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing