Athens DA and ‘The Agent’ still around though eol announcement has just been sent out for the latter.
Academic: University of Iran, OU, Bar Ilan University, KAUSTHealthcare:Servro Ochoa Hospital, SA Health , NAVMISSA (Navy Medicine Information Systems Support Activity), NHS, Saskatoon Health, MOH IranPublishingMark Allan Group, Nature publishing, T&F, Elseveier, Publishing Technologies & Science DirectPublic SectorVA, NHS, NAVMISSA (Navy Medicine Information Systems Support Activity), Commercial Shell, BT, Philips, AkzoNobel
PedigreeWhat we we’ve been doing since 1994Athena 1 launches in 1995Athena 2 launches in 1996Athena changes name to Athens in 1997Athens 3 launches in 1997Athens Agent launches in 1997Half million users in 1999One million users in 2001Two million users in 2002Three million users in 2004Three and a half million users in 2005, peaking at 3.7M in 2007OpenAthens SP launches 2007
InnovationWorld cloud from www.100open.com based on answers from client workshops and twitter after asking people to name their favourite innovations in history.Point out:Printing press more important than libraries, despite one clearly being the enabler of the other. Google appears to be bigger than the internet, despite one being totally reliant on the other!Innovation less successful in isolation and requires organisation, customers and partners to talk to each other.New platforms:MacOS Server and BUFVCColdFusion and The Academic LibraryUmbraco and YouGovhttp://www.100open.com/2011/02/whose-responsibility-is-innovation-anyway/http://www.100open.com/dev/wp-content/uploads/2011/02/worldcloud.jpg
Similar to Monteverde in scope/design – cloud-based architecture, includes content management system (Umbraco?) fronted by OASPGather up the long-tail of customers running older versions of the software (insert some stats from ST/JW)Smaller/niche publishers looking for a low cost of entry point or larger publishers needing a PoC/test platformEnabling a new segment of publisher customers within Universitieshttp://en.wikipedia.org/wiki/File:Jhomonsugi_in_Yaku_Island_Japan_001.JPG
Answer:Option C – This pretty much rules out its use for timely communications
Answer:Option B – Though this is becoming more difficult, what with recent compromises of CAs Comodo and DigiNotar.
Answer:Option B – Then personal assistance to the head of British Naval Intelligence, Fleming later wrote the 007 spy novels.
Answer:Option A – Preferably, they should be chosen at random and have similar bit lengths.
Answer:Option C – Cocks’s algorithm was kept secret by British intelligence until after Rivest, Shamir and Adelman discovered it independently.
Answer:Option D – It would take quantum computers to brute force 256-bit AES in a more reasonable time.
Answer:Option D – The term “hard” in this case is as used as in computational complexity theory.
Answer:Option A –
Answer:Option B – It is a follow-on to Blowfish and was a runner-up to Rijndael to become the Advanced Encryption Standard (AES). Dr.Suess was not involved.
Answer:Option D– Actually it’s WPA2.
Using OpenAthens SP - Customer experiences - David Evans
Using OpenAthens SPCustomer ExperiencesDavid EvansHead of Identity and Access Management Services
What is OpenAthens? “A family of federated access management solutions for Identity Providers and Electronic Resource Publishers”• OpenAthens MD - fully managed SaaS solution• OpenAthens LA - on-premise identity provider solution• OpenAthens SP - on-premise access management solution
The Encryption QuizThe complexity of encryption schemes has been increaseddramatically in an attempt to outpace the development ofcomputational tools designed to crack them. Now itsimportant to devise algorithms that cant be brute forced fortrillions of years in the hopes that they will remain securelong enough to be useful before they, too, are broken.Heres a quiz about encryption to see how well versed youare in one of securitys most important components.
Question One• How did the Rip van Winkle cipher get it‟s name?a) It was invented by Washington Irvingb) It was invented by IBM Researchers at Sleepy Hollow, N.Y.c) You could nap for 20 years before the encryption key pops upd) Tedious manual encryption made enciphers nod off
Question Two• In order for today‟s public key infrastructure to work you must trust…a) VeriSignb) Certificate Authoritiesc) Whitfield Diffie and Martin Hellmand) Your mother
Question Three• “Operation Ruthless”, a WWII British plan to steal a codebook for the German Naval Enigma encryption machine, was devised by whom?a) James Bondb) Ian Flemingc) Winston Churchilld) Tom Edmonds‟ great-grandfather
Question Four• Step One in the RSA algorithm for generating public and private keys is…a) Pick two prime numbersb) Choose a modulusc) Calculate the totient of nd) Determine d=e^1
Question Five• Who came up with the RSA algorithm in the first place?a) Heddy Lamar and George Antheil (1942)b) James H. Ellis (1970)c) Clifford Cocks (1973)d) Ron Rivest, Adi Shamir and Lenoard Adelman (1977)
Question Six• If a computer can brute force 56-bit Advanced Encryption Standard (AES) encryption in one second, how long will it take the same computer to brute force 256-bit AES?a) 48 hoursb) 36.6 yearsc) 14.0 x 10^12 yearsd) 50.9 x 10^50 years
Question Seven• Cryptographic hashes manipulate blocks of data to generate a fixed-size bit string. Which is NOT a property of an effective hash?a) It is hard to discover the message based on its hashb) It is hard to alter a message without altering its hashc) It is hard to create a message that results in a given hashd) It is hard to deduce what algorithm has been used to create a given hash
Question Eight• What is a salted hash?a) Combining a username with a hash of the username and hashing itb) An intentionally weak hash used to draw attackers‟ attention from real hashesc) A hash encrypted with an XR cipherd) A hash that has been tested against known dictionary attacks
Question Nine• Which of the following is a symmetric encryption algorithm?a) Onefishb) Twofishc) Redfishd) Bluefish
Question Ten• Which is the most relied upon WiFi option for encrypting communications?a) EduRoamb) WEPc) WAPd) WPA
Quiz Rating• How‟d you do? • 0-2: Stick to substitution ciphers • 3-5: Not a cracker • 6-8: Pretty good performance (PGP) • 9-10: A career at GCHQ awaits
Tie Break Question• In which year did the OpenAthens MD service register its 3,000,000th user?