IS Sumup
Upcoming SlideShare
Loading in...5
×
 

IS Sumup

on

  • 782 views

 

Statistics

Views

Total Views
782
Views on SlideShare
704
Embed Views
78

Actions

Likes
1
Downloads
44
Comments
0

1 Embed 78

http://startnewday85.blogspot.com 78

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

IS Sumup IS Sumup Presentation Transcript

  • INFORMATION SAFE SUMUP Hoang V.Nguyen
  • Agenda  What’s information safe.  Major problems and solutions.  Why must care.  Security ...  Q&AHoang V.Nguyen 5/1/2010 2
  • What’s information safe  In some cases, some properties of information must be protected  Our tasks ?What properties ?How to protectHoang V.Nguyen 5/1/2010 3
  • Major problems and solutions  Confidentiality • E: PxK C such that: if y=E(k,x) then: H(y)≥H(x) and maximize H(k) • D: CxK P  Integrity • You cannot protect • But you can detect  Trust • Make a belief to Alice and Bob  Others …. • ….Hoang V.Nguyen 5/1/2010 4
  • Major problems and solutions R R C4  Confidentiality • E: PxK C DES S Elliptic Curve such that: if y=E(k,x) then: H(y)≥H(x) and maximize H(k) blowfish IDEA A • D: CxK P  Integrity CMAC • You cannot protect Skien hash Family • But you can detect HMAC Digital signature  Trust • Make a belief to Alice and Bob Certificate Authority  Others …. • ….Hoang V.Nguyen 5/1/2010 5
  • Why must care? User Developer Project manager Our jobs? Designer Tester Make security Consultant Coder Solution Consultant Maintainer Business analystHoang V.Nguyen 5/1/2010 6
  • Security….  What • Theory • Solution/pattern • Design • System  How • Understand • Try to attack, and discover vulnerability • FixHoang V.Nguyen 5/1/2010 7
  • Security…. Michael Howard & others Andy Oram & John Viega Michael Howard & others The Security Development Lifecycle by Michael Howard & Steve Lipner 2006Hoang V.Nguyen 5/1/2010 8
  • Q&AHoang V.Nguyen 5/1/2010 9