IS Sumup

822 views
751 views

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
822
On SlideShare
0
From Embeds
0
Number of Embeds
81
Actions
Shares
0
Downloads
46
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

IS Sumup

  1. 1. INFORMATION SAFE SUMUP Hoang V.Nguyen
  2. 2. Agenda  What’s information safe.  Major problems and solutions.  Why must care.  Security ...  Q&AHoang V.Nguyen 5/1/2010 2
  3. 3. What’s information safe  In some cases, some properties of information must be protected  Our tasks ?What properties ?How to protectHoang V.Nguyen 5/1/2010 3
  4. 4. Major problems and solutions  Confidentiality • E: PxK C such that: if y=E(k,x) then: H(y)≥H(x) and maximize H(k) • D: CxK P  Integrity • You cannot protect • But you can detect  Trust • Make a belief to Alice and Bob  Others …. • ….Hoang V.Nguyen 5/1/2010 4
  5. 5. Major problems and solutions R R C4  Confidentiality • E: PxK C DES S Elliptic Curve such that: if y=E(k,x) then: H(y)≥H(x) and maximize H(k) blowfish IDEA A • D: CxK P  Integrity CMAC • You cannot protect Skien hash Family • But you can detect HMAC Digital signature  Trust • Make a belief to Alice and Bob Certificate Authority  Others …. • ….Hoang V.Nguyen 5/1/2010 5
  6. 6. Why must care? User Developer Project manager Our jobs? Designer Tester Make security Consultant Coder Solution Consultant Maintainer Business analystHoang V.Nguyen 5/1/2010 6
  7. 7. Security….  What • Theory • Solution/pattern • Design • System  How • Understand • Try to attack, and discover vulnerability • FixHoang V.Nguyen 5/1/2010 7
  8. 8. Security…. Michael Howard & others Andy Oram & John Viega Michael Howard & others The Security Development Lifecycle by Michael Howard & Steve Lipner 2006Hoang V.Nguyen 5/1/2010 8
  9. 9. Q&AHoang V.Nguyen 5/1/2010 9

×