Your SlideShare is downloading. ×
IS Sumup
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

IS Sumup

670
views

Published on

Published in: Technology

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
670
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
44
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. INFORMATION SAFE SUMUP Hoang V.Nguyen
  • 2. Agenda  What’s information safe.  Major problems and solutions.  Why must care.  Security ...  Q&AHoang V.Nguyen 5/1/2010 2
  • 3. What’s information safe  In some cases, some properties of information must be protected  Our tasks ?What properties ?How to protectHoang V.Nguyen 5/1/2010 3
  • 4. Major problems and solutions  Confidentiality • E: PxK C such that: if y=E(k,x) then: H(y)≥H(x) and maximize H(k) • D: CxK P  Integrity • You cannot protect • But you can detect  Trust • Make a belief to Alice and Bob  Others …. • ….Hoang V.Nguyen 5/1/2010 4
  • 5. Major problems and solutions R R C4  Confidentiality • E: PxK C DES S Elliptic Curve such that: if y=E(k,x) then: H(y)≥H(x) and maximize H(k) blowfish IDEA A • D: CxK P  Integrity CMAC • You cannot protect Skien hash Family • But you can detect HMAC Digital signature  Trust • Make a belief to Alice and Bob Certificate Authority  Others …. • ….Hoang V.Nguyen 5/1/2010 5
  • 6. Why must care? User Developer Project manager Our jobs? Designer Tester Make security Consultant Coder Solution Consultant Maintainer Business analystHoang V.Nguyen 5/1/2010 6
  • 7. Security….  What • Theory • Solution/pattern • Design • System  How • Understand • Try to attack, and discover vulnerability • FixHoang V.Nguyen 5/1/2010 7
  • 8. Security…. Michael Howard & others Andy Oram & John Viega Michael Howard & others The Security Development Lifecycle by Michael Howard & Steve Lipner 2006Hoang V.Nguyen 5/1/2010 8
  • 9. Q&AHoang V.Nguyen 5/1/2010 9

×