Final Year Project Interim Report
|
|
- Cordelia Estella Norris
- 8 years ago
- Views:
Transcription
1 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing ( ) Leung Sui Lun ( ) January 2013 D e p a r t m e n t o f C o m p u t e r S c i e n c e T h e U n i v e r s i t y o f H o n g K o n g
2 Abstract With the increasing usage of online file sharing platforms, the security of those currently provided services becomes a hot topic among the users. Files are more easily to be shared however their confidentiality is also dropped. Some file sharing platforms allow user to download file even without the need to input any password. AirCrypt has been developing to provide users an online storage and sharing platform and, at the same time, with sufficient security means. Making use of an NFC supported mobile device and a NFC tag, user can access their files in the server securely and conveniently. Sharing of file is also protected by access control. Security, user-friendly and cross-platforms are the main purpose of AirCrypt. 2
3 Contents 1. Background Objectives System Design Security Features Other Features System Architecture Main Application Flow Current Progress Android App Server and Client Program Development Tools Limitations and Difficulties Encountered Limitations Difficulties Encountered and Our Solutions Work Division Future Plan
4 1. Background In this modern year, computer is important device for people to communicate with each other and store information. Files like photos, music, videos, and documents are all stored as electronic copies. With the increasing usage of internet, people would like to share files with the others through the internet. Traditionally, user would share his/her file by sending the file directly to another, for example, through . However, it is quite time-consuming as user has to upload the file to the server every time. It may take a lot of time if there are many files to be sent or the file size is too large. And it is also inconvenient when sharing the file to a group of people. In recent year, file sharing platforms such as Dropbox are very popular as they allow users to share files easily. User just needs to upload the file to the platform once. After that, they can share the file easily by disturbing an URL of the file. People also make use of these platforms as an online storage so that they can access their file at any place and any time. These services are so convenient to be used. However, it is also well-known that they do not provide much security feature. Anyone holding an URL can access the file concerned even without the need to input any password. 4
5 2. Objectives Our objective is to develop a system which can provide an online storage and sharing platform and, at the same time, with high level of security. The security features include but not limited to: - Secure Transmission Channel The transmission of file and commands between client and server are securely protected using SSH. - Secure Online Storage The files stored in the server are encrypted using TrueCrypt, which is free open-source disk encryption software. - File Integrity Control Integrity check is performed whenever the file is uploaded and downloaded. - Access Control Only authorized user can have access to the file. The developed product is targeting on Small-Medium Enterprise, Organizations and individual users. 5
6 3. System Design 3.1 Security Features This section discuss the features that we have applied to make AirCrypt secure. - Multiple Factor Authentication In AirCrypt, users have to provide their mobile phone s International Mobile Station Equipment Identity (IMEI) and a NFC tag ID during registration. These two tokens will act as the password for authentication. The advantage is users can make use of a longer password without remembering it. Besides, since the two tokens are stored in different mediums, it will be more difficult to be stolen at the same time. - Public/Private Disk Separation Each user, after he/she successfully registered, will be assigned with 2 disks, which is public and private. These 2 disks are both located in the server and encrypted by TrueCrypt. The public disk contains files that file owner shared to others. The cryptography key is stored by the server. When authorized users request the file in the public disk, server will decrypt the disk and perform action on it. The private disk contains files that can only be accessed by the file owner and the cryptography key is kept by the owner. The server will have no knowledge about key. Whenever user wants to perform action on the private drive, he/she needs to send the key to the server. After server finished the action, it would destroy the key immediately. By applying different key management policy on public/private disk, we can provide a maximum privacy and security to the user. - Minimum Exposure Another important design for enhancing the security is by minimizing the exposure time. Exposure time means the time that public/private disks are not encrypted and the time that user can directly interact with the disks. We applied 2 mechanisms to minimize the exposure time. (1) Separation of file information and file data In our design, we store the file information in a separate database. For example, when user opens a folder, the server will send the directory list to the client. The list contains the information of files in this folder. So server will get the information from the database. In this process, the public/private disks remain 6
7 encrypted so file data are protected. (2) Indirect Contact with Encrypted Disks Every actions performed on the file is done in a temporary location. One example is downloading a file. When user wants to download a file, the server will first create a temporary space. Then it will decrypt the disk, copy the file and paste to the temporary space, and encrypt the disk. Then the download will start from the temporary location. So actually user has no direct contact with the disks. The private/public disks in server are encrypted in most of the time and will only be decrypted on demand. By doing so, we hope that it can reduce the possibility of any potential attacks. - SSH Communication Channel The server program and client program communicate through a SSH (Secure Shell) channel. The SSH protocol is the IETF (The Internet Engineering Task Force) standard for secure terminal access. It uses public-key cryptography to authenticate the remote computer. We also make use of SFTP (SSH File Transfer Protocol) for the file transmission. - Integrity check Whenever there is file transmission, we will do file integrity check using the md5 checksum. 7
8 3.2 Other Features - Firewall-Friendly Since we are using SSH as the communication channel. The server only needs to listen to port 22. It avoids complicated setting on the server. - Cross-Platform The AirCrypt Client Program is developed by Java, which means platform independent. The advantage is easy to maintain. Update can be done only once and the executable can run on platforms with java installed. Another advantage is the UI looks similar so user can easily pick up when they switch to different working platform. Windows ubuntu 8
9 3.3 System Architecture The following diagram shows the system architecture. AirCrypt applied the 3-Tier Client/Server Architecture. The Android App obtains the mobile phone s IMEI and NFC tag ID and sends to PC client through Bluetooth. The client and server communicate with each other through the SSH channel. Inside the server, there are program to handle requests from client, several databases which store user s information, file information, etc... and also the public/private disks which are encrypted by TrueCrypt. Components Android App Client Program Server Program DBs Frameworks and Technologies Android SDK 4.2, Java JavaSE-1.7, Bluecove, Standard Widget Toolkit JavaSE-1.7, mysql connector/j, Truecrypt Mysql Public/Private Disks Truecrypt 7.0a SSH Channel Provided by Jsch Library 9
10 3.4 Main Application Flow Registration: Step 1: Step 2: Step 3: Step 4: Step 5: PC client program requests IMEI and NFC tag ID from the android app Android app returns the IMEI and a scanned tag ID PC client sends the username, IMEI and tag ID to the server for registration. Server register the new user, create the public/private disk for the user. If success, return a confirm message. If fail, return an error message. Login: Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: PC client program requests IMEI and NFC tag ID from the android app Android app returns the IMEI and a scanned tag ID PC client sends the username, IMEI and tag ID to the server to authenticate Server authenticate the user If success, server returns a Login Credit to user. The Login Credit consists of the Unix login name and password. If fails, server returns an error message. PC client login to the server again using the Login Credit. 10
11 Upload (default private): Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: PC client program sends the file to server Server checks the file integrity If success, server request user to provide private key because, by default, newly uploaded file will be put in the private disk. If fail, server returns error message. Client sends the private key Server unlocks the private disk and copy the file to the disk. After that, server will immediately encrypt the disk and destroy the key. If success, server returns a confirm message. If fail, server returns an error message. Download (private): Step 1: Step 2: Step 3: PC client program sends the request of the file and the private key Server uses the key to decrypt the private disk, copy the file to a temporary location. After that, server will immediately encrypt the disk and destroy the key. If success, server will transfer the file from temporary location to user. If fail, server returns error message. 11
12 Download (public): Step 1: Step 2: Step 3: PC client program sends the request of the file. Server checks the access right of the file. If user has the right, server will get the key from database and use the key to decrypt the public disk, copy the file to a temporary location. Then public disk will then be encrypted again. If success, server will transfer the file from temporary location to user. If fail, server returns error message. Access Control: Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: User wants to change the access right of a file. Client program requests the list of access right of the file. The list contains users who are permitted to access the file. Server returns the list. User modifies the list through client program. Client program sends the modified list back to server. Server changes the access right according to the modified list. If success, server returns confirm message. If fail, server returns error message. 12
13 4. Current Progress 4.1 Android App At this stage, we have successfully developed the android app. The android app is able to scan the NFC tag and get the tag ID. Then it will send the tag ID with the phone s IMEI to the PC Client Program through Bluetooth. 13
14 4.2 Server and Client Program Most of the functions like upload, download and access control are already implemented. However, at this stage, we have only tested the login function and combined the GUI with it. The following screenshots show the testing of login function. Register User: demo Correct IMEI: 353xxxxxxxx Correct tag ID: 0x3b4644b6 Screenshot 1: Unregistered user login Screenshot 2: Registered user login with correct IMEI and NFC tag ID 14
15 Screenshot 3: Registered user login with wrong IMEI but correct NFC tag ID Screenshot 4: Registered user login with correct IMEI but wrong NFC tag ID 15
16 5. Development Tools (A) Eclipse [4.2.1] Eclipse SDK is free and open source software. It is popular software to develop applications in Java. It also provides useful libraries like JFace which helps our project to develop the GUI of the client program. (B) Android SDK [4.2] The Android SDK provides the API libraries and developer tools necessary to build, test, and debug apps for Android. It also contains sample codes about NFC functions which help a lot in developing our Android App. (C) ubuntu [12.04 LTS] We use ubuntu as our server s OS. ubuntu is a Unix-based Operating System. It has fast update of security batch. Also it is more secure when comparing with Windows. 16
17 6. Limitations and Difficulties Encountered 6.1 Limitations - Authentication Tokens Since we use IMEI and NFC tag ID as the authentication token, user must have a mobile phone with NFC function supported. At this moment, only a few android devices support the NFC function. - Bluetooth The Android App communicates with the PC client program through Bluetooth. Therefore, user s PC has to be equipped with Bluetooth. 6.2 Difficulties Encountered and Our Solutions - Permission problem We need to care about the folder/file permission to let authorized user to access the file to achieve the minimum privilege principle. For example: we make the private mount point as (drwx------,i.e. 700), set the owner and the group as the account holder (USER1:Account) to prevent unauthorized user to get into the mountpoint. Another example: we make the sharing mount point as (drwxr-x---,i.e. 750), set the owner and the group as the account holder (USER1:Account) to enable user to access to the mountpoint and get the file. - Account setup It is not feasible to create an UNIX account when a registration is done because of the security issue. So we are going to make the accounts REGULARLY using crontab utility (also called cron-job), schedule account creation each day. - SSH setting We need to decline the access of root accounts so that the hacker cannot take control using root accounts via SSH. (In Ubuntu LTS, after installing ssh package, edit it by sudo nano /etc/ssh/sshd_config And change the option PermitRootLogin Yes PermitRootLogin No) 17
18 - Truecrypt As well known, mounting need root permission. To prevent exposing password of root account when mounting, we need to add Truecrypt application as one application that execute as root permission without password. We use visudo utility to achieve this. - Java environment setting Since Ubuntu LTS does not have Java 7 included in the package (not available to Ubuntu default repository), we need to manually add a Java repository to install JRE and JDK. OpenJDK is not compatible to this program. - NFC detection The mobile device may already install Apps which can automatically detect the NFC tag. According to the Android SDK, a NFC signal can only be handled by one application. Therefore, in order to avoid the interruption by other Apps, we use enableforegrounddispatch to dominate the NFC detection when our App is opened. Another problem of NFC detection is the data obtained from the tag. The data retrieved from the tag is an array of byte. Therefore, we have to write our own function to convert the bytes into meaningful string. 18
19 7. Work Division Fong Chun Sing Leung Sui Lun Client Side - Program - Android App Server Side - Program - Set-up - configuration System Design Presentation Report 19
20 8. Future Plan - Sharing Function In our initial design, the user shares the file by assigning the access right and sends a link to another user for download. However, we think it may not be convenient for user. So we are considering implementing an exchanging system. When user A assigns the access right to user B, the server will automatically send a message to notify user B about the permission. - Prevent request replay attack In this stage, we don t add the mechanism on preventing replay attack because we want to develop and debug easily. In fact, preventing replay attack is important for any system to prevent potential attack. We will achieve that by adding a random generated temporary token to the request to prevent replay attack. - Encrypt all request In this stage, request are sent with plain text (although the transmission channel is secure), it is safe to encrypt the request with symmetric key to prevent any potential misuse of system. - Change password lifetime of an UNIX account At this stage, all UNIX password and username are stored in database permanently and we are not going to modify that password. In fact, it is better to change the password lifetime to prevent potential attack. We will adopt the method on how an account is created. We create a cronjob that regularly update the password of the UNIX account. 20
SSH and FTP on Ubuntu 9.04. WNYLUG Neal Chapman 09/09/2009
SSH and FTP on Ubuntu 9.04 WNYLUG Neal Chapman 09/09/2009 SSH (Secure Shell) Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices.
More informationLast modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First
More informationICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0
ICE Futures Europe AFTS Technical Guide for Large Position Reporting V1.0 ICE FUTURES EUROPE Page 1 of 7 Contents 1. Introduction... 3 2. Online access to Clearing Systems... 4 3. Uploading Data... 5 4.
More informationLab 0 (Setting up your Development Environment) Week 1
ECE155: Engineering Design with Embedded Systems Winter 2013 Lab 0 (Setting up your Development Environment) Week 1 Prepared by Kirill Morozov version 1.2 1 Objectives In this lab, you ll familiarize yourself
More informationQuick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationUnifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
More informationAdministration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
More informationGETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures
A. Secure File Transfer Protocol (SFTP) Procedures Overview IEHP utilizes our Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using
More informationHow To Run A Hello World On Android 4.3.3 (Jdk) On A Microsoft Ds.Io (Windows) Or Android 2.7.3 Or Android 3.5.3 On A Pc Or Android 4 (
Developing Android applications in Windows Below you will find information about the components needed for developing Android applications and other (optional) software needed to connect to the institution
More informationFile transfer clients manual File Delivery Services
File transfer clients manual File Delivery Services Publisher Post CH Ltd Information Technology Webergutstrasse 12 CH-3030 Berne (Zollikofen) Contact Post CH Ltd Information Technology Webergutstrasse
More informationUser Manual of the Pre-built Ubuntu 12.04 Virutal Machine
SEED Labs 1 User Manual of the Pre-built Ubuntu 12.04 Virutal Machine Copyright c 2006-2014 Wenliang Du, Syracuse University. The development of this document is/was funded by three grants from the US
More informationUsing Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
More informationEZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
More informationSecuring Ship-to-Shore Data Flow
Securing Ship-to-Shore Data Flow Background on Common File Transfer Methods Today corporations, government entities, and other organizations rely on Electronic File Transfers as an important part of their
More informationCloud Storage Service
Cloud Storage Service User Guide (Web Interface, Android App) Table of Content System Requirements...4 1.1Web Browser... 4 1.2Mobile Apps... 4 Accessing Cloud Storage using a Web Browser... 4 The Web Home
More informationXerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
More informationHow To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple
Intralinks Customer Managed Keys Technical Overview Version 2.0 October 2014 Copyright 2014 Intralinks, Inc. 1 Intralinks Customer Managed Keys, Technical Overview January 5, 2015 About This Document...
More informationIBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
More informationSecure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
More informationLivezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
More informationRemote Desktop Administration
Remote Desktop Administration What is it? Remote Desktop Administration allows a user with appropriate privileges to connect to his/her computer at Rice from another computer, similar to the way one may
More informationTable of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
More informationHow To Install Storegrid Server On Linux On A Microsoft Ubuntu 7.5 (Amd64) Or Ubuntu (Amd86) (Amd77) (Orchestra) (For Ubuntu) (Permanent) (Powerpoint
StoreGrid Linux Server Installation Guide Before installing StoreGrid as Backup Server (or) Replication Server in your machine, you should install MySQL Server in your machine (or) in any other dedicated
More informationHow To Create A Bada App On Android 2.2.2 (Mainfest) On Android 3.5.2 And Get A Download Of Bada (For Android) On A Microsoft Gosu 2.5 (For Black
I. bada... 3 1. Developer Site : Register application development information... 3 1) Registration procedure... 3 2) Standards for managing mainfest.xml depending on status of registration for bada application
More informationOnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
More informationEZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationInstallation Guidelines (MySQL database & Archivists Toolkit client)
Installation Guidelines (MySQL database & Archivists Toolkit client) Understanding the Toolkit Architecture The Archivists Toolkit requires both a client and database to function. The client is installed
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationCONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
More informationData Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
More informationClearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
More informationAddonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features
1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage
More informationKaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
More informationSIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)
1 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) Mohammad S. Hasan Agenda 2 Looking at Today What is a management protocol and why is it needed Addressing a variable within SNMP Differing versions Ad-hoc Network
More informationHP SDN VM and Ubuntu Setup
HP SDN VM and Ubuntu Setup Technical Configuration Guide Version: 1 September 2013 Table of Contents Introduction... 2 Option 1: VirtualBox Preconfigured Setup... 2 Option 2: VMware Setup (from scratch)...
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationRemote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
More informationLearning Remote Control Framework ADD-ON for LabVIEW
Learning Remote Control Framework ADD-ON for LabVIEW TOOLS for SMART MINDS Abstract This document introduces the RCF (Remote Control Framework) ADD-ON for LabVIEW. Purpose of this article and the documents
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationSenomix Timesheets for Mac OS X
for Mac OS X Self-Installed Server Installation Guide v5.1 2015 Senomix Software Inc. www.senomix.com Table of Contents 1.0 - Introduction... 1 2.0 - System Overview... 2 3.0 - Timesheets Server Installation
More informationBootstrap guide for the File Station
Bootstrap guide for the File Station Introduction Through the File Server it is possible to store files and create automated backups on a reliable, redundant storage system. NOTE: this guide considers
More informationEvaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
More informationFeatures of AnyShare
of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...
More informationU.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
More informationUser s manual for Android Application
Motorised IP Video surveillance camera for smartphones, tablets and PC / MAC. Protect your home and family remotely! User s manual for Android Application Thanks We thank you for choosing Aquila Vizion.
More informationChapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
More informationEncryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0
Encryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0 Page 1 of 13 Table of Contents 1. Introduction... 3 2. System work flow and terminology... 3 3. User Descriptions...
More informationThese options allow you to define baseline settings for how scanning will occur on your network
Network Discovery Asset Manager can discover devices attached to your network automatically, probe them for configuration data, and create assets in your database. The network discovery system is fully
More informationNipper Studio Beginner s Guide
Nipper Studio Beginner s Guide Multiple Award Winning Security Software Version 2.1 Published March 2015 Titania Limited 2014. All Rights Reserved This document is intended to provide advice and assistance
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for
More informationManual for Android 1.5
Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor
More informationDecember 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure
December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
More informationUser and Reference Manual
User and Reference Manual User & Reference Manual All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying,
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationSecure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012
Secure Installation and Operation of Your Xerox Multi-Function Device Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Purpose and Audience This document
More informationSSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems
SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software
More informationFast remote data access for control of TCP/IP network using android Mobile device
RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationQsync Install Qsync utility Login the NAS The address is 192.168.1.210:8080 bfsteelinc.info:8080
Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.
More informationEncrypted Email Services
Encrypted Email Services Version 2.1 General Level Instructions HIPAA Compliant Solution for Secured Communications via Email 2012-2013 Page 1 of 13 Table of Contents 1. Introduction 1.1 Description 1.2
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationEnhanced Security for Online Banking
Enhanced Security for Online Banking MidSouth Bank is focused on protecting your personal and account information at all times. As instances of internet fraud increase, it is no longer sufficient to use
More informationUsing the Push Notifications Extension Part 1: Certificates and Setup
// tutorial Using the Push Notifications Extension Part 1: Certificates and Setup Version 1.0 This tutorial is the second part of our tutorials covering setting up and running the Push Notifications Native
More informationBudget Event Management Design Document
Budget Event Management Design Document Team 4 Yifan Yin(TL), Jiangnan Shangguan, Yuan Xia, Di Xu, Xuan Xu, Long Zhen 1 Purpose Summary List of Functional Requirements General Priorities Usability Accessibility
More informationSetting Up One Search
Your teachers and students can take advantage of your school s subscription databases all in one place through Destiny One Search. One Search saves staff and patrons time and effort by letting them search
More informationMethods available to GHP for out of band PUBLIC key distribution and verification.
GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and
More informationCipherLab 5100 Time Attendance Utility Manual
CipherLab 5100 Time Attendance Utility Manual K:\Products\Product Technical\BI\BI-PC5100T\CipherLab5100TimeAttendnaceUtilityManual0707-process.doc Page 1 / 13 1 Login A popup form as follows will appear
More informationWhat IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
More informationFrom Centralization to Distribution: A Comparison of File Sharing Protocols
From Centralization to Distribution: A Comparison of File Sharing Protocols Xu Wang, Teng Long and Alan Sussman Department of Computer Science, University of Maryland, College Park, MD, 20742 August, 2015
More informationSSH Key Exchange: Windows client to Unix/Linux server
SSH Key Exchange: Windows client to Unix/Linux server Table of contents 1 Audience... 2 2 Purpose...2 3 Prerequisites...2 4 SSH Key exchange: Windows client & Unix/Linux Server...3 4.1 Outline of steps
More informationRSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
More informationEgnyte App for Android Quick Start Guide
Egnyte App for Android Quick Start Guide Introduction Welcome to the Quick Start Guide for the Egnyte App for Android. This guide will explain how to: Access files. Download content for offline access.
More informationCasper Suite Release Notes. Version 9.1
Casper Suite Release Notes Version 9.1 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationLast modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version 1.1.058
Last modified: September 12, 2013 This manual was updated for TeamDrive Personal Server version 1.1.058 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Installing the TeamDrive Personal Server...
More informationThe Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
More informationGeorgia State Longitudinal Data System
Georgia State Longitudinal Data System FTP Client Installation Manual Version 3.0 Table of Contents 1 Overview... 3 2 FTP Connection Checklist... 3 3 FTP Installation Instructions... 4 4 Apply license
More informationAccess Instructions for United Stationers ECDB (ecommerce Database) 2.0
Access Instructions for United Stationers ECDB (ecommerce Database) 2.0 Table of Contents General Information... 3 Overview... 3 General Information... 3 SFTP Clients... 3 Support... 3 WinSCP... 4 Overview...
More informationHow To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
More informationEnterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More informationTera Term Telnet. Introduction
Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start
More informationTABLE OF CONTENTS. Legend:
user guide Android Ed. 1.1 TABLE OF CONTENTS 1 INTRODUCTION... 4 1.1 Indicators on the top tool bar... 5 1.2 First control bar... 7 1.3 Second control bar... 7 1.4 Description of the icons in the main
More informationSecurity in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
More informationQuickStart Guide for Managing Mobile Devices. Version 9.2
QuickStart Guide for Managing Mobile Devices Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
More informationGoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationRemote Access to Unix Machines
Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework
More informationVMware Horizon Workspace Security Features WHITE PAPER
VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon
More informationNFC EXPRESS User Manual
NFC EXPRESS User Manual E8557 / First Edition October 2013 Copyright 2013 ASUSTeK Computer Inc. All Rights Reserved Contents 1 Launching NFC EXPRESS... 3 1.2 NFC EXPRESS screen... 4 2 Setting up Windows
More informationGetting Started with Web Hosting at TechServ
Getting Started with Web Hosting at TechServ 1/19/2011 http://www.dusers.drexel.edu/techserv/ CollegiateLink: TechServ techserv@drexel.edu Thank you for your interest in TechServ s Web and File Hosting
More informationAd Hoc (Temporary) Accounts Instructions
DLG/PDV SFTP Server Instructions 1. Ad Hoc (Temporary) Accounts. 2. LeadsGen (Permanent) Accounts. 3. Manually configuring SFTP Clients (WinSCP & FileZilla). 4. Uploading files into SFTP server. 5. Frequently
More informationPenetration Testing for iphone Applications Part 1
Penetration Testing for iphone Applications Part 1 This article focuses specifically on the techniques and tools that will help security professionals understand penetration testing methods for iphone
More informationcbox YOUR FILES GO MOBILE! FOR MAC OSX CLIENT USER MANUAL
cbox YOUR FILES GO MOBILE! FOR MAC OSX CLIENT USER MANUAL Introduction cbox is a software that you can easily install on your computer. Once done, an online storage drive cbox appears in the file tree
More informationGDC Data Transfer Tool User s Guide. NCI Genomic Data Commons (GDC)
GDC Data Transfer Tool User s Guide NCI Genomic Data Commons (GDC) Contents 1 Getting Started 3 Getting Started.......................................................... 3 The GDC Data Transfer Tool: An
More informationWinSCP PuTTY as an alternative to F-Secure July 11, 2006
WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated
More informationBoard also Supports MicroBridge
This product is ATmega2560 based Freeduino-Mega with USB Host Interface to Communicate with Android Powered Devices* like Android Phone or Tab using Android Open Accessory API and Development Kit (ADK)
More informationIceBreak FileShare. Quick Guide. File sharing with workflow management
IceBreak FileShare Quick Guide File sharing with workflow management on IBM i 2 IceBreak FileShare Content IceBreak FileShare... 3 Features... 4 Requirements... 6 Limitations... 6 Test sites... 6 Install
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
More information