You are in the Configuration Management Business

Size: px
Start display at page:

Download "You are in the Configuration Management Business"

Transcription

1 You are in the Configuration Management Business By: John Washburn April 12, 2006

2 Abstract This paper is directed to any person involved in the testing, certification, qualification, approval or purchase of election voting equipment. The paper covers why the esoteric field of configuration management (version control) is intimately and inextricably linked to the testing, certification, qualification, approval, purchase, delivery and auditing of election voting equipment. The paper describes: What is configuration management Why configuration management of software is difficult What is a physical configuration audit document What is minimum information which should be included in a physical configuration audit document How to use a physical configuration audit document to decide if your system is correct.

3 Abstract...2 What is configuration management?... 4 Why should you care?... 5 Identification... 8 File Fingerprints Comparing Systems... 11

4 What is configuration management? Secretaries of state, state election boards, and other election officials are now grappling with approving, certifying, purchasing, and auditing voting machinery. Unfortunately, most of these officials fail to realize is if you are in the business of testing, approving, qualifying, certifying, purchasing, or auditing election systems you are necessarily in the configuration management business. What is configuration management? Configuration management is the art and practice of defining what is meant by the phrase the system. Software and any system which executes software are inherently mutable. This ability to change the functionality of a software-based system easily and cheaply is usually a virtue. For testing, approving, qualifying, certifying, purchasing, and auditing software systems this mutability though is a positive vice. Configuration management is how to reign in this inherent mutability. Configuration management is how to precisely define the system under test (or system pending approval, qualification, certification, or purchased). Configuration management is how the system is frozen so testing, approval, qualification, or certification can be performed on a single system; not a system which is changes while under test. For those interested in fine details of configuration management, I recommend the book: Software Configuration Management by Jessica Keyes. Election officials do not need to know the fine details of configuration management in order to understand the daunting task facing them. An electronic election system is a collection of hardware and programming. Programming may be stored on a form of read only memory (ROM, PROM, EPROM, or EEPROM, etc.) or on traditional mutable media (hard disk, RAM, smart cards, memory packs, flash memory, etc.). Programming stored on mutable or removable media is called software. Programming stored on an immutable or hard to change media is called firmware. Both firmware and software are programming. The difference is the storage medium and the easy with which the programming on that medium can be changed.

5 Why should you care? Before an elector casts a vote on an electronic election system, there are 4 stages which are intimately and inextricably linked to configuration management. These stages are NASED qualification, state certification, purchase by local election administrators and post-election auditing. Until December 2007 there is no Federal qualification process for election systems. NASED qualification is administered by the National Association of State Election Directors (NASED), and 3 vendor-funded laboratories called independent test authorities. State certification is administered by the chief election authority of the state. The chief election official varies from state to state; Secretary of State, an independent State Election Board, or an appointed position. The purchase by local election administrators also varies by state. In some states the purchase authority is at the county or parish level. In other states the purchase authority is at the municipal (City, Village, or town) level or a combination of both levels. Some but not all states require auditing election systems. But, even if auditing is not mandated every state give election officials the authority to audit election systems as part of their authority in order to insure state and or federal election laws were not violated. How are these activities inextricably tied to configuration management? Imagine the electronic election system is represented by a CD-ROM. The directories on the CD-ROM will be used to represent the hardware used by the electronic election system. The files in a particular directory represent the programming executed on that hardware component. For this analogy there is no distinction between programming stored on traditional mutable media (software) and programming stored on read-only media (firmware). Each activity: NASED qualification, state approval, and local purchase involves 3 possibly, different systems. For the remainder of this paper the system which is NASED qualified will be represented by a CD-ROM with a blue label. The system which is certified (or approved) by the state will be represented by a CD-ROM with a green label. The systems actually purchased by a local election administrator will be represented by CD-ROM s with white labels. The system(s) selected for auditing by CD-ROM s with red labels. Many states require the source code for approved system be held in escrow. The 2002 Voluntary Election systems Guidelines in section 4.2 of Volume I, require the source code and build tools delivered by the vendor be examined the vendor-funded independent test authority laboratory. The collection of source code and build tools will be will be represented by CD-ROM s with yellow labels.

6

7 Ideally the blue CD-ROM (NASED qualified election system) is the same as the green CD-ROM (state approved election system) which in turn is the same as every white CD-ROM (the systems actually delivered to a local election official) is in turn the same as every red CD-ROM (the systems selected for random audits). Also, the source code given to the vendor-funded labs or to the states for escrow (the yellow CD s) should be the same and should actually create the software found on the election systems (Blue, Green, White, and Red CD s) Configuration Management is how to know and verify all these systems are indeed the same. Configuration management is how to insure only NASED qualified systems which are state approved are sold to local election administrators to be used to aid in election administration. Configuration management is how to determine the system submitted for state certification is NASED qualified. Configuration management is how to determine if the system purchased by a local election official is state approved. Configuration management is how to determine if all the systems purchased by a local election official are the same in all precincts. Configuration management is how to determine if all the systems presented for examination during an audit are the same systems used in a local election. Configuration management is how to define what is meant by the phrase this system is the same as that system. Configuration management is how to determine which systems are the same so testing results from one system can be applied to all systems which are the same. Configuration management is how to determine the source code examined for defects and malicious code is actually the same source code used to build a given set of system components. Configuration management is how to determine if the source code submitted to the vendor-funded laboratories for examination is the same source code held in escrow on behalf the state s chief elections officer.

8 Identification The first step in configuration management is identification of the system. This is most commonly done by completely and correctly identifying all of the system components. What is the particular constellation of hardware, software, and firmware which comprise the particular system under consideration? The tool used for such system identification is the physical configuration audit document. The physical configuration audit document is a complete enumeration of the identification information for each of the following: The collection of hardware used by the system, The collection of firmware used for each piece of hardware, The collection of traditional software created by the vendor for the system, The collection of common libraries used by the system, The collection of commercial off the shelf (COTS) software used by the system. The collection of initialization files, parameter files, scripts, stored procedures, database views, registry entries, environment variable or other files and data used by the system during the operation and used of the system. Hardware platforms are relatively easy to identify because the circuitry of hardware changes infrequently. Because of the immutability of hardware, recording the manufacturer, model number and serial number is usually sufficient to completely and correctly identify a hardware component. For hardware, the physical configuration audit document is used primarily to note additions or deletions of hardware more than changes in hardware. Programming (traditional, firmware, COTS, common library, interpreted scripts, database procedures, database views, etc.) is another problem altogether. Programming is so inherently mutable that recording the name of the file and the version number is absolutely inadequate to correctly and completely identify the software component. Common elements used to identify software components are name, creation date, and version number. All three of these are woefully inadequate for use in a physical configuration audit document. Files are easily renamed. The program, touch, is a utility specifically designed to change the file date to any date specified. The program, touch, is used extensively by many organizations for build management and to assign the same file date to all software components delivered on a distribution CD. The version number is information maintained in a manner similar to any other source component of software. Most organizations leave the maintenance of version information to the developer. Very few organizations automate the assignment of version information and prevent the developer from altering the version information manually. The result is programming (software or firmware) can be labeled with the same version number but be substantially (or completely) different. If filename, version number, and creation date are inadequate to identify a software component, what is adequate to identify software components? At the minimum file size and a checksum are needed to identify a software component. The most common checksum used is the 32-bit cyclical redundancy checksum know as CRC-32. But even these 2 statistics, file size and CRC-32, are inadequate. The recording of these 2 statistics are used to detect mistakes. Both statistics are easily subverted if the intent is deception; passing one piece of software off as another. File size can be adjusted by padding with harmless characters within the file. Similarly if any 4 bytes within a file can be changed arbitrarily without affecting program execution, the resulting file can be assign any CRC-32 value desired. Recording the file size and CRC-32 is adequate for informal configuration management; such as where the testing team and the development team have the same project manager. What is needed for more formal arrangements (such as independent testing labs or 3 rd party certification) is a more precise and deceptionresistant means to identify software components. These deception-resistant identification methods are cryptographic hashes. Cryptographic hashes are also called file fingerprints, file hashes, hash values, message digests. Sometimes and only by the most technically inept, a cryptographic hash is mistakenly referred to as a

9 signature, digital signature, or electronic signature. While all digital signature protocols use cryptographic hashes, digital signatures posses 2 properties which a cryptographic hash does not. A digital signature has the property of authentication. Cryptographic hashes or MAC do not. Authentication is where one knows for certain the identity of the person(s) who created the digital signature. A digital signature has the property of non-repudiation. Cryptographic hashes or MAC do not. Non-repudiation means the signer of a file cannot say I did not sign this. In other words, non-repudiation is the assurance only the authenticated signer could have created the digital signature in question. The legal definitions of the properties of a digital signature are found in the Uniform Electronic Transactions Act the text which is incorporated into the statutes of several states such as here in Wisconsin statute. For the remainder of this paper I will use the term file fingerprint instead of cryptographic hash. File fingerprint is a much less intimidating a term than cryptographic hash but does not lose much if any of the precision of the concept behind a cryptographic hash.

10 File Fingerprints File fingerprinting (Cryptographic hashes) treat all electronic files as a collection of ones and zeros and as such can be thought of as a number of huge magnitude. File fingerprinting maps this huge number (the file contents) down into a smaller number of fixed size; usually 120, 160, 256, 384, or 512 bits (16, 20, 32, 48, or 64 bytes) in length. The exact method and details of this mapping is irrelevant to this paper but can be found here: <WIKI URL>. What is important are the following properties of a file fingerprint (cryptographic hash): 1. The same file contents always map to the same hash value. In other words if the contents of one file, M are identical to the contents of a second file, 1 M, then the hash value of file one, H 2 M, is 1 equal to the hash value of file two, H. This is expressed symbolically as: M M M M M 1 H H The change of even a single bit in the contents of file will change the value of about half the bits in the hash value of the new (1 bit changed) file and the hash value of the original file. 3. Given a hash value of the contents of some file, it is hard to create a second file whose contents map to the same hash value. 4. Given a large number of documents it is unlikely there exist 2 files among these which are both different and have the same hash value. Physical Configuration Audit documents must at a minimum contain the following: file name, file location (path), file size, and At leash one file fingerprint (cryptographic hash value) of the contents of the file. Better still is a second file fingerprint (cryptographic hash value) from another family of hashes. The more cryptographic hash values recorded the better.

11 Comparing Systems Once a physical configuration audit (PCA) document is created (e.g. for the White CD-ROM s) it needs to be compared to a second physical configuration audit document (e.g. the PCA for the Green CD-ROM s). This implies a certain level of infrastructure is available. In order to perform this comparison of systems: One needs to have tools which can create a PCA document for a given system. One has to use those tools to create PCA documents for 2 or more systems (e.g. 2 or more CD-ROM s). One needs to have tools which can compare 2 PCA documents of 2 systems for any differences present between the 2 systems. One needs some criterion to determine the significance of any differences found. A collection of PCA documents and tools can be found here: A partial PCA of the author s laptop can be in Jww txt. This PCA is an enumeration of all the found in the \Windows\ directory prior to an upgrade of the Windows XP operating system. This PCA document was created using the PERL script, FingerprintFiles.pl, which has been compiled into a stand-alone executable file, FingerprintFiles.exe. A second such PCA of the author s laptop can be in Jww txt. This PCA is an enumeration of all the found in the \Windows\ directory after the upgrade of the Windows XP operating system. This second PCA was created using the same tools as created the first PCA. The lines of data in Jww txt and Jww txt are tab-delimited and can be imported into Microsoft Excel or a database. For example, from the PCA document, Jww txt, the DLL containing the Microsoft Common Dialog boxes, comdlg32.dll, has the following identifying properties. Full Path: c:\windows\system32\comdlg32.dll File Size: bytes MD5 Hash value: 1EDB1BB89D021955E6F B8D) SHA1 Hash value: 517CAD5C781E950B23B82A578CB The 2 PCA documents each have more than 13,000 entries. Comparing one PCA to the other would be near impossible to do manually. In order to compare one PCA manifest often a second program is used identify the differences found between 2 PCA documents. The results of comparing the first PCA document to the second are found in Comp txt. This comparison of PCA documents was created using the PERL script, CompareManifests.pl, which has been compiled into a stand-alone executable, CompareManifests.exe. There are? kinds of differences identified by CompareManifests.pl, 1. A file is found in one PCA document but not in the other. This indicates an addition or deletion of a file. 2. A file is found in both PCA s but the fingerprint (size, MD5 hash or SHA1 hash) is different. This indicates the file has been upgraded or substituted. 3. Two files with different names or locations are found to have an identical fingerprint (file size, MD5 hash and SHA1 hash are the same). This indicates the file has been renamed or moved to a different location.

12 Here is an excerpt from Comp txt. Notice the 3 kinds of differences reported. File, c:\windows\$ntuninstallkb891122$\spuninst\spuninst.exe, was found in jww txt, but not in jww txt File, c:\windows\$ntuninstallkb891122$\spuninst\updspapi.dll, was found in jww txt, but not in jww txt File, c:\windows\registeredpackages\{30c7234b a55-a11d-ecd f2}\msscp.dll, in jww txt has a different fingerprint than the fingerprint in jww txt File, c:\windows\registeredpackages\{30c7234b a55-a11d-ecd f2}\mswmdm.dll, in jww txt has a different fingerprint than the fingerprint in jww txt File, c:\windows\registeredpackages\{30c7234b a55-a11d-ecd f2}\mspmsnsv.dll, in jww txt has a different fingerprint than the fingerprint in jww txt File, c:\windows\system32\dllcache\wmsdmod.dll, in jww txt has a different fingerprint than the fingerprint in jww txt File, c:\windows\system32\dllcache\wmsdmoe2.dll, in jww txt has a different fingerprint than the fingerprint in jww txt File, c:\windows\system32\dllcache\wmspdmod.dll, in jww txt has a different fingerprint than the fingerprint in jww txt File, c:\windows\system32\dllcache\wmspdmoe.dll, in jww txt has a different fingerprint than the fingerprint in jww txt File, c:\windows\system32\dllcache\wmvcore.dll, in jww txt has a different fingerprint than the fingerprint in jww txt File, c:\windows\system32\dllcache\wmvdmod.dll, in jww txt has a different fingerprint than the fingerprint in jww txt File, c:\windows\system32\dllcache\wmvdmoe2.dll, in jww txt has a different fingerprint than the fingerprint in jww txt Each of the following files has a total fingerprint of: E79B07E1CA5F840830A84F 8740BAAAC A450415BEC77F0F0883D95C. c:\windows\$hf_mig$\kb890046\update\spcustom.dll c:\windows\$hf_mig$\kb890859\update\spcustom.dll c:\windows\$hf_mig$\kb893066\update\spcustom.dll c:\windows\$hf_mig$\kb893086\update\spcustom.dll c:\windows\$hf_mig$\kb893756\update\spcustom.dll Each of the following files has a total fingerprint of: F1D005ABCE2E6D9AB47ED E52E28D68ACA F840C74B24F292E. c:\windows\system32\spool\drivers\w32x86\3\hpsmac05.gpd c:\windows\system32\spool\drivers\w32x86\hewlett_packardhp_la7e8a_print_hpz\hpsmac05.gpd Each of the following files has a total fingerprint of: 9248 E7629D B7E604C831DE1FEE8F1 6AEE8B0DC09F9E2E07BFA9EE4E609988EFA8E2AC. c:\windows\fonts\ega40737.fon c:\windows\fonts\ega40869.fon Each of the following files has a total fingerprint of: D46F E533872D50259F21C78F 97870CBB5A4F837A4D220D1987B11E77C9A212B5. c:\windows\system32\dllcache\mscpxl32.dll c:\windows\system32\mscpxl32.dll Each of the following files has a total fingerprint of: BF B6C3804EC90D A5 4949CF698AD786E08FA5CCCA8D142D61FA c:\windows\pchealth\helpctr\offlinecache\professional_32#0409\ query c:\windows\pchealth\helpctr\offlinecache\professional_32#0409\ query Each of the following files has a total fingerprint of: B5EAAEDB8A9D3F98DEBBDB0CFD214D5 C9E09F6F6026F928D3D6D9056AF868DF83BD44EF. c:\windows\$hf_mig$\kb890046\update\update.exe c:\windows\$hf_mig$\kb890859\update\update.exe c:\windows\$hf_mig$\kb893066\update\update.exe c:\windows\$hf_mig$\kb893086\update\update.exe

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006

Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object

More information

Executable Integrity Verification

Executable Integrity Verification Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network

More information

Monitor file integrity using MultiHasher

Monitor file integrity using MultiHasher Monitor file integrity using MultiHasher Keep Research Data Securely Integrity Monitoring Beginner Introduction This guide describes the use of MultiHasher, an integrity monitoring tool for Microsoft Windows

More information

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014 Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security

More information

WYLE REPORT NO. T57381-01. Appendix A.4. Security TEST CASE PROCEDURE SPECIFICATION (T57381.-60)

WYLE REPORT NO. T57381-01. Appendix A.4. Security TEST CASE PROCEDURE SPECIFICATION (T57381.-60) WYLE REPORT NO. T57381-01 Appendix A.4 Security TEST CASE PROCEDURE SPECIFICATION (T57381.-60) TABLE OF CONTENTS Page No. 1.0 INTRODUCTION 1 1.1 Scope 1 1.2 References 1 1.3 Terms and Abbreviations 3 1.4

More information

Operating System Today s Operating Systems File Basics File Management Application Software

Operating System Today s Operating Systems File Basics File Management Application Software Lecture Content Operating System Today s Operating Systems File Basics File Management Application Software Operating Systems and File Management 2 Operating Systems and File Management 3 Operating System

More information

What is WS_FTP? How WS_FTP Works

What is WS_FTP? How WS_FTP Works What is WS_FTP? WS_FTP is the leading file transfer client with millions of users worldwide. You can easily and securely transfer files between your home and office and to and from customers, clients,

More information

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Whitepaper Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Phone (0) 161 914 7798 www.distology.com info@distology.com detecting the unknown Integrity

More information

Guidance for Industry. 21 CFR Part 11; Electronic Records; Electronic Signatures. Electronic Copies of Electronic Records

Guidance for Industry. 21 CFR Part 11; Electronic Records; Electronic Signatures. Electronic Copies of Electronic Records Guidance for Industry 21 CFR Part 11; Electronic Records; Electronic Signatures Electronic Copies of Electronic Records Draft Guidance This guidance document is being distributed for comment purposes only.

More information

Ciphire Mail. Abstract

Ciphire Mail. Abstract Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the

More information

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Selected Windows XP Troubleshooting Guide

Selected Windows XP Troubleshooting Guide 1 Selected Windows XP Troubleshooting Guide To locate lost files: Compiled by: Jason M. Cohen Check these locations to locate lost files: The My Documents folder Click Start, and then click My Documents.

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

HP VMware ESXi 5.0 and Updates Getting Started Guide

HP VMware ESXi 5.0 and Updates Getting Started Guide HP VMware ESXi 5.0 and Updates Getting Started Guide Abstract This guide is intended to provide setup information for HP VMware ESXi. HP Part Number: 616896-002 Published: August 2011 Edition: 1 Copyright

More information

An Introduction to Cryptography as Applied to the Smart Grid

An Introduction to Cryptography as Applied to the Smart Grid An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

Copyright 1999 by EPSON America, Inc. 3/99 Torrance, California, USA

Copyright 1999 by EPSON America, Inc. 3/99 Torrance, California, USA EPSON is a registered trademark of SEIKO EPSON Corporation. PhotoPC is a registered trademark, and HyPict, Image Authentication System, and FaxAdvice are trademarks of EPSON America, Inc. SoundAdvice is

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

INDEPENDENT TESTING LABORATORY

INDEPENDENT TESTING LABORATORY INDEPENDENT TESTING LABORATORY CERTIFICATION PROCESS ITL CERTIFICATION CHECKLIST QUALIFICATIONS and CONDITIONS of CERTIFICATION MGC Gaming Technology Laboratory March 2015 Rev 3 9 15 Version 12.0 Independent

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

SBClient SSL. Ehab AbuShmais

SBClient SSL. Ehab AbuShmais SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

Digital Forensics Tutorials Acquiring an Image with FTK Imager

Digital Forensics Tutorials Acquiring an Image with FTK Imager Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,

More information

SkyRecon Cryptographic Module (SCM)

SkyRecon Cryptographic Module (SCM) SkyRecon Cryptographic Module (SCM) FIPS 140-2 Documentation: Security Policy Abstract This document specifies the security policy for the SkyRecon Cryptographic Module (SCM) as described in FIPS PUB 140-2.

More information

EAC Decision on Request for Interpretation 2008-03 (Operating System Configuration)

EAC Decision on Request for Interpretation 2008-03 (Operating System Configuration) EAC Decision on Request for Interpretation 2008-03 (Operating System Configuration) 2002 VSS Volume1: 2.2.5.3, 4.1.1, 6.2.1.1, Volume2: 3.5 2005 VVSG Volume1: 2.1.5.2, 5.1.1, 7.2.1, Volume2: 3.5 Date:

More information

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation

Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified

More information

Guide to Using DoD PKI Certificates in Outlook

Guide to Using DoD PKI Certificates in Outlook Report Number: I33-002R-2005 Guide to Using DoD PKI Certificates in Outlook Security Evaluation Group Authors: Margaret Salter Mike Boyle Updated: June 9, 2005 Version 4.0 National Security Agency 9800

More information

Cisco Trust Anchor Technologies

Cisco Trust Anchor Technologies Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed

More information

Software Verification and Authentication in a Gaming Device

Software Verification and Authentication in a Gaming Device Software Verification and Authentication in a Gaming Device White Paper Date: February 15, 2000 39355 California Street, Suite 307 Fremont, CA 94538 1 Introduction Gaming machine development has progressed

More information

User Guide - English. ServerView Suite. DeskView and ServerView Integration Pack for Microsoft SCCM

User Guide - English. ServerView Suite. DeskView and ServerView Integration Pack for Microsoft SCCM User Guide - English ServerView Suite DeskView and ServerView Integration Pack for Microsoft SCCM Edition June 2010 Comments Suggestions Corrections The User Documentation Department would like to know

More information

epblue GxP oftware manual Software version 20.4.1 075 900.874

epblue GxP oftware manual Software version 20.4.1 075 900.874 ee ab. pblue n. ig. p. manual GxP oftware manual epblue GxP Software manual Software version 20.4.1 075 900.874 Copyright 2012 Eppendorf AG, Hamburg. No part of this publication may be reproduced without

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup

More information

How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server

How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time

More information

SECURITY IN NETWORKS

SECURITY IN NETWORKS SECURITY IN NETWORKS GOALS Understand principles of network security: Cryptography and its many uses beyond confidentiality Authentication Message integrity Security in practice: Security in application,

More information

Introduction. There are several bits of information that must be moved:

Introduction. There are several bits of information that must be moved: Backup and restore on new hardware XProtect Professional VMS Products 2014: XProtect Enterprise 2014, XProtect Professional 2014, XProtect Express 2014, XProtect Essential 2014 Introduction This document

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

FLORIDA VOTING SYSTEM CERTIFICATION PROCESS

FLORIDA VOTING SYSTEM CERTIFICATION PROCESS 1 FLORIDA VOTING SYSTEM CERTIFICATION PROCESS Division of Elections Dr. Gisela Salas, Director State Certification of Voting Systems: Best Practices and Future Direction Kennesaw State University s Center

More information

TrusCont TM TSFD Protection Toolkit

TrusCont TM TSFD Protection Toolkit TrusCont TM TSFD Protection Toolkit Version 2.4 User's Manual September 2011 2006-2011 TrusCont Ltd. Table of Contents 1. INTRODUCTION 8 1.1 TSFD KEY FEATURES 8 1.2 WHAT S NEW IN VERSION 2.4 8 1.3 WHAT

More information

VERITAS NetBackup 6.0 Encryption

VERITAS NetBackup 6.0 Encryption VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

PROXKey Tool User Manual

PROXKey Tool User Manual PROXKey Tool User Manual 1 Table of Contents 1 Introduction...4 2 PROXKey Product... 5 2.1 PROXKey Tool... 5 2.2 PROXKey function modules...6 2.3 PROXKey using environment...6 3 PROXKey Tool Installation...7

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information

AD Image Encryption. Format Version 1.2

AD Image Encryption. Format Version 1.2 AD Image Encryption Format Version 1.2 17 May 2010 Table of Contents Introduction... 3 Overview... 3 Image Formats... 4 Keys... 4 Credentials... 4 Certificates... 4 Image Key encryption... 5 Appendix A

More information

MCOLES Information and Tracking Network. Security Policy. Version 2.0

MCOLES Information and Tracking Network. Security Policy. Version 2.0 MCOLES Information and Tracking Network Security Policy Version 2.0 Adopted: September 11, 2003 Effective: September 11, 2003 Amended: September 12, 2007 1.0 POLICY STATEMENT The Michigan Commission on

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

SanDisk Enterprise Secure USB Flash Drive Security Vulnerability

SanDisk Enterprise Secure USB Flash Drive Security Vulnerability SanDisk Enterprise Secure USB Flash Drive Security Vulnerability Device CD-ROM partition can be a host for malware and crimeware February 2009 Introduction After my recent experiences with the Read Only

More information

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

FIPS 140 2 Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive FIPS 140 2 Non Proprietary Security Policy Kingston Technology Company, Inc. DataTraveler DT4000 G2 Series USB Flash Drive Document Version 1.8 December 3, 2014 Document Version 1.8 Kingston Technology

More information

Upgrade Guide. Platform Compatibility. Dell Secure Mobile Access 11.0.0 Upgrade Guide

Upgrade Guide. Platform Compatibility. Dell Secure Mobile Access 11.0.0 Upgrade Guide Dell SonicOS This document describes the process of obtaining your Dell Secure Mobile Access firmware update file, verifying it, and installing it on an existing appliance. Updating a clustered pair of

More information

Chapter 4. Operating Systems and File Management

Chapter 4. Operating Systems and File Management Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup

More information

Fighting product clones through digital signatures

Fighting product clones through digital signatures Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover

More information

Using WMI Scripts with BitDefender Client Security

Using WMI Scripts with BitDefender Client Security Using WMI Scripts with BitDefender Client Security Whitepaper Copyright 2009 BitDefender; Table of Contents 1. Introduction... 3 2. Key Benefits... 4 3. Available WMI Script Templates... 5 4. Operation...

More information

CALIFORNIA SOFTWARE LABS

CALIFORNIA SOFTWARE LABS ; Digital Signatures and PKCS#11 Smart Cards Concepts, Issues and some Programming Details CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite

More information

USB PC Adapter V4 Configuration

USB PC Adapter V4 Configuration Programming PC adapter V4 USB PC Adapter V4 Configuration PC adapter with USB cable Flat Ribbon Cable Power Supply Unit Device Driver General The USB PC adapter V4 is used for communication between a PC

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

User Guide. Digital Signature

User Guide. Digital Signature User Guide Digital Signature ENTRUST ESP 9..2 Document version: 2.2 Publication date: January 2014 This guide is the exclusive property of Notarius Inc. All reproduction, printing or distribution of this

More information

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the

More information

Embedded Software development Process and Tools: Lesson-3 Host and Target Machines

Embedded Software development Process and Tools: Lesson-3 Host and Target Machines Embedded Software development Process and Tools: Lesson-3 Host and Target Machines 1 1. Host-Target Based Development Approach 2 Host-Target System Development Approach During development process, a host

More information

CRS Report for Congress Received through the CRS Web

CRS Report for Congress Received through the CRS Web Order Code RS20344 Updated January 19, 2001 CRS Report for Congress Received through the CRS Web Summary Electronic Signatures: Technology Developments and Legislative Issues Richard M. Nunno Analyst in

More information

YubiKey Integration for Full Disk Encryption

YubiKey Integration for Full Disk Encryption YubiKey Integration for Full Disk Encryption Pre-Boot Authentication Version 1.2 May 7, 2012 Introduction Disclaimer yubico Yubico is the leading provider of simple, open online identity protection. The

More information

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?

Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System? Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers

More information

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC

Digital Forensics. Tom Pigg Executive Director Tennessee CSEC Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze

More information

Servant Keeper Frequently Asked Questions

Servant Keeper Frequently Asked Questions Servant Keeper Frequently Asked Questions Can I import my data from another program? Yes, using our Optional Import Tool you are able to import data from your existing database into the Servant Keeper

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

Voting Systems Security, Testing & More

Voting Systems Security, Testing & More Voting Systems Security, Testing & More Montana Secretary of State Linda McCulloch Elections and Government Services Division sos.mt.gov soselections@mt.gov 2014 Election Official Certification Training

More information

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents

Centran Version 4 Getting Started Guide KABA MAS. Table Of Contents Page 1 Centran Version 4 Getting Started Guide KABA MAS Kaba Mas Welcome Kaba Mas, part of the world-wide Kaba group, is the world's leading manufacturer and supplier of high security, electronic safe

More information

Digital Signatures on iqmis User Access Request Form

Digital Signatures on iqmis User Access Request Form Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,

More information

B U S I N E S S G U I D E

B U S I N E S S G U I D E VeriSign Microsoft Office/Visual Basic for Applications (VBA) Code Signing Digital Certificates Realizing the Possibilities of Internet Software Distribution CONTENTS + What Is Developer Code Signing?

More information

Comdial Network Management System User Instructions

Comdial Network Management System User Instructions Comdial Network Management System User Instructions GCA40 237.01 8/00 printed in U.S.A. Microsoft and Windows 95 are registered trademarks of Microsoft Corporation, Redmond WA. pcanywhere is a registered

More information

Advanced Malware Cleaning Techniques for the IT Professional

Advanced Malware Cleaning Techniques for the IT Professional Advanced Malware Cleaning Techniques for the IT Professional Mark Russinovich Microsoft Technical Fellow This section of the Microsoft Security Intelligence Report provides information and guidance for

More information

The Keyed-Hash Message Authentication Code (HMAC)

The Keyed-Hash Message Authentication Code (HMAC) FIPS PUB 198-1 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION The Keyed-Hash Message Authentication Code (HMAC) CATEGORY: COMPUTER SECURITY SUBCATEGORY: CRYPTOGRAPHY Information Technology Laboratory

More information

Digital Forensics at the National Institute of Standards and Technology

Digital Forensics at the National Institute of Standards and Technology NISTIR 7490 Digital Forensics at the National Institute of Standards and Technology James R. Lyle Douglas R. White Richard P. Ayers NISTIR 7490 Digital Forensics at the National Institute of Standards

More information

CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS

CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS These Cybersecurity Testing and Certification Service Terms ( Service Terms ) shall govern the provision of cybersecurity testing and certification services

More information

The Impact of 21 CFR Part 11 on Product Development

The Impact of 21 CFR Part 11 on Product Development The Impact of 21 CFR Part 11 on Product Development Product development has become an increasingly critical factor in highly-regulated life sciences industries. Biotechnology, medical device, and pharmaceutical

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

LifeSize Networker Installation Guide

LifeSize Networker Installation Guide LifeSize Networker Installation Guide November 2008 Copyright Notice 2006-2008 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

Digital Evidence Search Kit

Digital Evidence Search Kit Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University

More information

PDF Signer User Manual

PDF Signer User Manual PDF Signer User Manual Introduction The main function of PDF Signer is to sign PDF documents using X.509 digital certificates. Using this product you can quickly sign multiple PDF files (bulk sign) by

More information

Payment Card Industry (PCI) Policy Manual. Network and Computer Services

Payment Card Industry (PCI) Policy Manual. Network and Computer Services Payment Card Industry (PCI) Policy Manual Network and Computer Services Forward This policy manual outlines acceptable use Black Hills State University (BHSU) or University herein, Information Technology

More information

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere

More information

E-CERT C ONTROL M ANAGER

E-CERT C ONTROL M ANAGER E-CERT C ONTROL M ANAGER for e-cert on Smart ID Card I NSTALLATION G UIDE Version v1.7 Copyright 2003 Hongkong Post CONTENTS Introduction About e-cert Control Manager... 3 Features... 3 System requirements...

More information

The purpose of this document is to guide you through the installation and configuration of a new ShipGear installation.

The purpose of this document is to guide you through the installation and configuration of a new ShipGear installation. The purpose of this document is to guide you through the installation and configuration of a new ShipGear installation. Following is an overview of sections in this document: Section A Installing ShipGear

More information

What TV Ratings Really Mean

What TV Ratings Really Mean What TV Ratings Really Mean You just heard that a TV Show was ranked #1 in the Nielsen Media Research ratings. What does that really mean? How does Nielsen Media Research "rate" TV shows? Why do shows

More information

Internal Audit. Audit of the Inventory Control Framework

Internal Audit. Audit of the Inventory Control Framework Internal Audit Audit of the Inventory Control Framework June 2010 Table of Contents EXECUTIVE SUMMARY...4 1. INTRODUCTION...7 1.1 BACKGROUND...7 1.2 OBJECTIVES...7 1.3 SCOPE OF THE AUDIT...7 1.4 METHODOLOGY...8

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA SecurID Software Token 1.0 for Android Administrator s Guide RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

SLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature

SLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature Security Confirmation and Report T-Systems.02192.TE.08.2007 SLE66CX322P or SLE66CX642P / CardOS V4.2B FIPS with Application for Digital Signature Siemens AG Confirmation concerning Products for Qualified

More information

SENATE BILL 6139. State of Washington 64th Legislature 2015 2nd Special Session

SENATE BILL 6139. State of Washington 64th Legislature 2015 2nd Special Session S-.1 SENATE BILL State of Washington th Legislature nd Special Session By Senators Miloscia and Roach Read first time 0//. Referred to Committee on Government Operations & Security. 1 AN ACT Relating to

More information

ENROLMENT GUIDE FOR MCACert

ENROLMENT GUIDE FOR MCACert ENROLMENT GUIDE FOR MCACert Congratulations! You are about to become the proud owner of a Digital Signature Certificate issued by SafeScrypt, India s first Licensed Certifying Authority, under the aegis

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

More information

Web-Based Data Backup Solutions

Web-Based Data Backup Solutions "IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of

More information

Electronic And Digital Signatures

Electronic And Digital Signatures Electronic And Digital Signatures Summary The advent of e-government and e-services is changing the way we do business. Traditionally, we created records on paper and we authenticated a record by signing

More information

PGP Command Line Version 10.3 Release Notes

PGP Command Line Version 10.3 Release Notes PGP Command Line Version 10.3 Release Notes Page 1 of 6 PGP Command Line Version 10.3 Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information

More information

SMART Sync 2011. Windows operating systems. System administrator s guide

SMART Sync 2011. Windows operating systems. System administrator s guide SMART Sync 2011 Windows operating systems System administrator s guide Trademark notice SMART Sync, smarttech and the SMART logo are trademarks or registered trademarks of SMART Technologies ULC in the

More information