InfoSecWriters.com - Cryptography http://www.infosecwriters.com/articles/cryptography en The Importance of Digital Certificates http://www.infosecwriters.com/articles/2017/05/22/importance-digital-certificates <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/key.png?itok=p9tqVZ7N"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/key.png?itok=p9tqVZ7N" width="700" height="530" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by </p> <p>The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they should not purchase something that doesn’t have a digital certificate and about a hacker group called Suckfly using digital certificates to exploit them for their benefits.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/CEnriquez_Cert.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/5/feed" method="post" id="fivestar-custom-widget" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--2" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give The Importance of Digital Certificates 1/5</option><option value="40">Give The Importance of Digital Certificates 2/5</option><option value="60">Give The Importance of Digital Certificates 3/5</option><option value="80">Give The Importance of Digital Certificates 4/5</option><option value="100">Give The Importance of Digital Certificates 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-sA1NenA4hIG_9Y_3Ipcru-nuCbFnrxa06uS43tnPdsM" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 22 May 2017 13:01:57 +0000 manager 469 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/05/22/importance-digital-certificates#comments Bitlocker http://www.infosecwriters.com/articles/2017/04/13/bitlocker <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/bitlocker.png?itok=gvw9ubd9"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/bitlocker.png?itok=gvw9ubd9" width="250" height="242" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by an Anonymous source.</p> <p>This paper is a good introduction to Bitlocker. Microsoft bitlocker is a full disk encryption tool/software to help protect data that is saved on the hard drive that has Microsoft windows installed on the system.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/Bitlocker.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/5/feed" method="post" id="fivestar-custom-widget--2" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--4" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Bitlocker 1/5</option><option value="40">Give Bitlocker 2/5</option><option value="60">Give Bitlocker 3/5</option><option value="80">Give Bitlocker 4/5</option><option value="100">Give Bitlocker 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--2" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-VqatJZmAl7vBoKqxSm8OllXMPFVOkEEEcGLWykBuJbc" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Thu, 13 Apr 2017 13:54:18 +0000 manager 452 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2017/04/13/bitlocker#comments Steganography FAQ http://www.infosecwriters.com/articles/2016/08/22/steganography-faq <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/steg.jpg?itok=SpHy-05d"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/steg.jpg?itok=SpHy-05d" width="680" height="400" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Aelphaeis Mangarae</p> <p>Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often confused with cryptology because the two are similar in the way that they both are used to protect important information. The difference between the two is that Steganography involves hiding information so it appears that no information is hidden at all. If a person or persons views the object that the information is hidden inside of he or she will have no idea that there is any hidden information, therefore the person will not attempt to decrypt the information.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/AMangarae_Steganography.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/5/feed" method="post" id="fivestar-custom-widget--3" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--6" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Steganography FAQ 1/5</option><option value="40">Give Steganography FAQ 2/5</option><option value="60">Give Steganography FAQ 3/5</option><option value="80">Give Steganography FAQ 4/5</option><option value="100">Give Steganography FAQ 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--3" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-hDsyUQhFrJ9pPcRtqbZIf-cauz9SOgEMAEHmr8_SiUc" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 22 Aug 2016 18:44:08 +0000 manager 430 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2016/08/22/steganography-faq#comments Cloud Computing and Homomorphic Encryption http://www.infosecwriters.com/articles/2016/07/25/cloud-computing-and-homomorphic-encryption <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/securingthec.jpg?itok=6TC7wSey"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/securingthec.jpg?itok=6TC7wSey" width="368" height="247" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Vicki Holzknecht</p> <p>Cloud Computing has recently gained quite a bit of momentum throughout the technology community. The Cloud is intertwined in everyday living via mobility platforms, social networking, email, accessing cloud based applications, the list goes on for miles. Cloud Computing allows for services to be delivered by simply having an Internet connection. When encrypted data is sent to the cloud is it truly secure? How safe is the Cloud? The research within this paper will explain how a form of encryption known as homomorphic can be interlaced into the software for truly encrypting data without it ever being decrypted when stored within the cloud.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/VHolzknecht_Homomorphic_Encryption.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/5/feed" method="post" id="fivestar-custom-widget--4" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--8" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Cloud Computing and Homomorphic Encryption 1/5</option><option value="40">Give Cloud Computing and Homomorphic Encryption 2/5</option><option value="60">Give Cloud Computing and Homomorphic Encryption 3/5</option><option value="80">Give Cloud Computing and Homomorphic Encryption 4/5</option><option value="100">Give Cloud Computing and Homomorphic Encryption 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--4" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-Vlfw96e4tQKmxHK6E02grKTacoWy4UXudGlgcOdL3f4" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 25 Jul 2016 18:55:26 +0000 manager 420 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2016/07/25/cloud-computing-and-homomorphic-encryption#comments Distinguishing Attack on FastFlex Stream Cipher http://www.infosecwriters.com/articles/2016/01/11/distinguishing-attack-fastflex-stream-cipher <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/encryption_0.jpg?itok=U0yWwwyN"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/encryption_0.jpg?itok=U0yWwwyN" width="700" height="466" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by M. Orumiehchi</p> <p>Fastflex is a fast and flexible stream cipher that is designed for hardware and software environments. In this article, we point out that the keystream generated from FastFlex can be distinguished from a truly random stream with probability 1 and a few output streams.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/MOrumieh_FastFlex_Stream_Cipher.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/5/feed" method="post" id="fivestar-custom-widget--5" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--10" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Distinguishing Attack on FastFlex Stream Cipher 1/5</option><option value="40">Give Distinguishing Attack on FastFlex Stream Cipher 2/5</option><option value="60">Give Distinguishing Attack on FastFlex Stream Cipher 3/5</option><option value="80">Give Distinguishing Attack on FastFlex Stream Cipher 4/5</option><option value="100">Give Distinguishing Attack on FastFlex Stream Cipher 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--5" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-huiF4gyqMC_0YP7I9oYd7BSDGzsP-H02N1bU8hETCUs" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 11 Jan 2016 14:21:24 +0000 manager 372 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2016/01/11/distinguishing-attack-fastflex-stream-cipher#comments An Encrypto-Stego Technique Based Secure Data Transmission System http://www.infosecwriters.com/articles/2015/12/28/encrypto-stego-technique-based-secure-data-transmission-system <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/Steganography.jpg?itok=gBoV_qxj"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/Steganography.jpg?itok=gBoV_qxj" width="500" height="334" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Neha Sharma, Mr. J. S. Bhatia, and Dr. Mrs. Neena Gupta</p> <p>Digital communication has become an essential part of infrastructure nowadays, a lot of applications are Internet-based and in some cases it is desired that communication be made secret. Consequently, the security of information has become a fundamental issue. Two techniques are available to achieve this goal: Encryption and steganography is one of them. Using cryptography, the data is transformed into some other gibberish form and then the encrypted data is transmitted. In steganography, the data is embedded in an image file and the image file is transmitted.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/NSharma_encrypto.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/5/feed" method="post" id="fivestar-custom-widget--6" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--12" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give An Encrypto-Stego Technique Based Secure Data Transmission System 1/5</option><option value="40">Give An Encrypto-Stego Technique Based Secure Data Transmission System 2/5</option><option value="60">Give An Encrypto-Stego Technique Based Secure Data Transmission System 3/5</option><option value="80">Give An Encrypto-Stego Technique Based Secure Data Transmission System 4/5</option><option value="100" selected="selected">Give An Encrypto-Stego Technique Based Secure Data Transmission System 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="average-rating">Average: <span >5</span></span> <span class="total-votes">(<span >1</span> vote)</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--6" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-A-wvAiS_VAZf2WnLcC4vI4pgLkxchgXYHVDAcWvBP4g" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 28 Dec 2015 21:37:57 +0000 manager 355 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2015/12/28/encrypto-stego-technique-based-secure-data-transmission-system#comments What is the point of encryption if you don’t know who for? http://www.infosecwriters.com/articles/2015/12/28/what-point-encryption-if-you-don%E2%80%99t-know-who <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/data_encryption.jpg?itok=mRJEeRvg"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/data_encryption.jpg?itok=mRJEeRvg" width="350" height="305" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Dr. Colin Walter</p> <p>Phishing is the fastest growing threat in the history of Internet and has gained immense popularity amongst Internet fraudsters and hackers as a simple yet effective way to gain unsolicited access to confidential user information. Using social engineering tactics, fraudsters ensure that the trust relationship established by a company with its customers is exploited to maximum effect. It is for this reason that moving towards stronger identity assurance techniques is the only long term strategy that will maintain the stability of the Internet.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/CWalter_encryption-Phishing.pdf">To view it click here</a>. </p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/5/feed" method="post" id="fivestar-custom-widget--7" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--14" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give What is the point of encryption if you don’t know who for? 1/5</option><option value="40">Give What is the point of encryption if you don’t know who for? 2/5</option><option value="60">Give What is the point of encryption if you don’t know who for? 3/5</option><option value="80">Give What is the point of encryption if you don’t know who for? 4/5</option><option value="100">Give What is the point of encryption if you don’t know who for? 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--7" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-umRKO5WJn0n0TIKjHAHUAuFYEvod4Rfl3N5-5geN40c" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 28 Dec 2015 21:32:30 +0000 manager 354 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2015/12/28/what-point-encryption-if-you-don%E2%80%99t-know-who#comments Five Mistakes of Data Encryption http://www.infosecwriters.com/articles/2015/12/28/five-mistakes-data-encryption <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/dataencryption.jpg?itok=Uz3gbGeQ"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/dataencryption.jpg?itok=Uz3gbGeQ" width="444" height="250" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Dr. Anton Chuvakin</p> <p>If you follow the media today, you might get to a conclusion that data encryption is everywhere. However, is this “good” encryption? A classic saying “Encryption is easy; key management is hard” illustrates one of the pitfalls that await those implementing encryption enterprise-wide or even SMB-wide. This paper covers some of the other mistakes that often occur when organizations try to use encryption to protect data-at-rest and data-in-transit and thus improve their security posture.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/AChuvakin_Encryption_Mistakes.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/5/feed" method="post" id="fivestar-custom-widget--8" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--16" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Five Mistakes of Data Encryption 1/5</option><option value="40">Give Five Mistakes of Data Encryption 2/5</option><option value="60">Give Five Mistakes of Data Encryption 3/5</option><option value="80">Give Five Mistakes of Data Encryption 4/5</option><option value="100">Give Five Mistakes of Data Encryption 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--8" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-ghHOB1O903ofgUIQnXyS7zsf80uqiEZtJtGMRzeMRXQ" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 28 Dec 2015 21:28:17 +0000 manager 353 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2015/12/28/five-mistakes-data-encryption#comments Database Security – Encryption http://www.infosecwriters.com/articles/2015/11/30/database-security-%E2%80%93-encryption <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/database_encryption.jpg?itok=rlo7ZvwH"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/database_encryption.jpg?itok=rlo7ZvwH" width="600" height="600" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Jack Webb</p> <p>The paper will cover the importance of databases and why their contents should be secure. Databases are a necessity in today's corporate environment. Even though databases are important to business productivity, their security in most cases are still considered second to other areas. The paper will cover the initial concepts of database. In order to properly place security controls, we must understand the necessary risks involved with improper database security. It is also necessary to cover the types of threats and attacks that can be launched to gain access to or disrupt access to a database. As it would be a long process to cover all possible controls to securing databases, it better to just cover a single concept in database security such as encryption.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/JWebb_database_encryption.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/5/feed" method="post" id="fivestar-custom-widget--9" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--18" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give Database Security – Encryption 1/5</option><option value="40">Give Database Security – Encryption 2/5</option><option value="60">Give Database Security – Encryption 3/5</option><option value="80">Give Database Security – Encryption 4/5</option><option value="100">Give Database Security – Encryption 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--9" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-r6-vy8a2s2ey1wMIgxj-A8ph-6nRmWyPGsIsqUaqUW0" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Mon, 30 Nov 2015 15:49:31 +0000 manager 342 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2015/11/30/database-security-%E2%80%93-encryption#comments User Authentication Through the Use of Public Key Infrastructure (PKI) http://www.infosecwriters.com/articles/2015/11/25/user-authentication-through-use-public-key-infrastructure-pki <div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/PKI-Certificate.gif?itok=72NPTKzX"><img typeof="foaf:Image" src="http://www.infosecwriters.com/sites/default/files/styles/article_image_full_node/public/field/image/PKI-Certificate.gif?itok=72NPTKzX" width="700" height="460" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Contributed by Robert Meacham </p> <p>The information I would like to cover in this paper will be in the use of the Public Key Infrastructure (PKI). The key area of focus will be on its use in the authentication of users in relation to network access for segments of the Department of Defense (DoD) Global Information Grid (GIG) infrastructure. I will discuss views from its implementation, expansion, benefits, issues and management perspective briefly in order to provide a better understanding of the impact this change has had on security and the management of such an undertaking. Details pertaining to the infrastructure, methods of implementation and usage will be discussed. Then a look into the effects of policies and the importance of documenting the methods used to implement user authentication through the Public Key Infrastructure within the organization. Without good management and the implementation of policies and procedures in place, the likelihood of misinterpretation and security flaws can occur that will directly affect the confidentiality, integrity and availability of an organization infrastructure.</p> <p>This document is in PDF format. <a href="http://www.infosecwriters.com/Papers/RMeacham_PKI.pdf">To view it click here</a>.</p> </div></div></div><div class="field field-name-field-rate field-type-fivestar field-label-inline clearfix"><div class="field-label">Rate this article:&nbsp;</div><div class="field-items"><div class="field-item even"><form class="fivestar-widget" action="/taxonomy/term/5/feed" method="post" id="fivestar-custom-widget--10" accept-charset="UTF-8"><div><div class="clearfix fivestar-average-text fivestar-average-stars fivestar-form-item fivestar-default"><div class="form-item form-type-fivestar form-item-vote"> <div class="form-item form-type-select form-item-vote"> <select id="edit-vote--20" name="vote" class="form-select"><option value="-">Select rating</option><option value="20">Give User Authentication Through the Use of Public Key Infrastructure (PKI) 1/5</option><option value="40">Give User Authentication Through the Use of Public Key Infrastructure (PKI) 2/5</option><option value="60">Give User Authentication Through the Use of Public Key Infrastructure (PKI) 3/5</option><option value="80">Give User Authentication Through the Use of Public Key Infrastructure (PKI) 4/5</option><option value="100">Give User Authentication Through the Use of Public Key Infrastructure (PKI) 5/5</option></select> <div class="description"><div class="fivestar-summary fivestar-summary-average-count"><span class="empty">No votes yet</span></div></div> </div> </div> </div><input class="fivestar-submit form-submit" type="submit" id="edit-fivestar-submit--10" name="op" value="Rate" /><input type="hidden" name="form_build_id" value="form-yScVNBsRkG1PfRSETqqesuaCK4kvk3Bd5yadkrajAMw" /> <input type="hidden" name="form_id" value="fivestar_custom_widget" /> </div></form></div></div></div> Wed, 25 Nov 2015 14:47:11 +0000 manager 331 at http://www.infosecwriters.com http://www.infosecwriters.com/articles/2015/11/25/user-authentication-through-use-public-key-infrastructure-pki#comments