The Security Newsletter

Size: px
Start display at page:

Download "The Security Newsletter"

Transcription

1 The Security Newsletter In this issue Be our guest: Jacques Stern In the news USB hacksaw Virus shares secrets Social engineering: the USB way The largest Mersenne prime number Recovering secrets via simple branch prediction analysis The DRM war: news from the front lines Fingerprinting and filtering Theory to practice: an audio/video fingerprint What is the state-of-the-art content filtering technology? Anti-piracy in theaters Published quarterly by: Thomson Corporate Research Part of the Technology Division Technical Editor: Eric Diehl Editors: Nicholas de Wolff Elizabeth Marx Contributors: Michael Arnold Jeffrey Bloom Olivier Courtay Alain Durand Didier Doyen Marc Joye Mohamed Karroumi Frédéric Lefebvre Yves Maetz Stéphane Onno Jacques Stern (ENS) SBU Technology Head: Jean-Charles Hourcade 005 will probably remain, in the history of security, as the year that marked of the first successful attack on SHA-1: the cryptographic hash function standard (see security newsletter N 1). In reaction, the US National Institute of Standards and Technologies (NIST) initiated a process to select the successor to SHA-1. NIST already standardized several cryptographic functions such as DES, AES or SHA-1. This summer, NIST disclosed its tentative schedule: a five-year long public process. During the first year, the requirements of the new algorithm will be defined, followed by three successive rounds of evaluation over the next three years to select the final candidate. Each round will study the candidates, evaluate the attacks and eliminate the weakest candidates. The worldwide cryptographic community will participate in this process. At the end of this process, NIST will draft the standard, collect comments, and publish the new standard cryptographic function. The final publication should be in th quarter 01. In our ever-faster paced world, this may seem incomprehensibly long. In the security world, this is normal. Basic cryptographic functions and protocols are the foundations of all secure systems. Weak foundations make for poor construction. Serious security requires two things: time and careful scrutiny. NIST rightfully incorporates both components into its process. The Security Newsletter is glad to welcome recent CNRS gold medal recipient Jacques Stern. Jacques is a well-known cryptographer. Thomson and Jacques have collaborated for more than ten years. E. DIEHL, Technical Editor security.newsletter@thomson.net Web: 1 Copyright Thomson 006

2 Be our guest: Jacques Stern (ENS) Interview by A. DURAND Jacques, we would first like to congratulate you for your recent CNRS Gold Medal award. Could you explain what the award is for? Since 195, the CNRS Gold Medal is a yearly distinction awarded to a French Researcher for the whole of his scientific work. Sixty scientists have already been honored, including seven Nobel and two Fields Medal laureates. Furthermore, this is the first time it has been awarded to a computer scientist. What are the current trends in Cryptology research? I foresee the continuing effort in research of both foundations and applications. As for theory, the past twenty years have been mostly dedicated to block ciphers analysis, the study of RSA and security proofs. These domains are now quite well understood even if some progress can still be expected. The three main domains for further research are hash functions; stream ciphers; and security proofs for protocols involving many parties and many cryptographic primitives (e.g. multi-party computation or composition). Finally, some surprises and new fields may turn up. For instance, it is amazing that zero knowledge was proposed ten years ago only after the discovery of public key cryptography. You just mentioned hash functions. What do you think about the process set up by the NIST? The process is similar to the one used to come up with AES and it was a good process. However, when the AES process started, cryptanalysis of block ciphers was already well studied. This is not the case for hash functions. There is indecision on whether we should base new hash functions designed on the same constructions and design them to counter known attacks or if we should start the work over which would take at least 15 years. As a conclusion, we need to stand back, pay attention, and not rush too quickly towards a given direction. And what about the future of cryptographic applications? Many applications already use cryptography but I can think of several new fields. First, electronic voting has been subject to much research. What is disturbing is that none of the currently deployed systems actually use these results. We know however, that cryptography is necessary to guarantee trust in election results. I suppose more research is needed to let research and industry solutions converge. The second is of particular interest to Thomson. DRM security is a very difficult problem that cannot be solved without the help of cryptography. The challenge is that the whole cryptographic environment is controlled by the adversary (i.e. the end user) which is not a usual assumption. Thus, we need to develop original solutions. Finally, it is surprising that there are so few examples of mass deployment of public key cryptography 30 years after its invention. If it were to spread, we would certainly have to face new problems. In the News USB hacksaw Hack5 is a monthly internet television show which presents the latest hacks. The last show introduced the USB Hacksaw. Hacksaw stealthily copies files off USB drives inserted into a PC and sends them out to an address. The hack is a modified version of the USB dumper org/. It targets a specific U3 Enabled USB Flash Drive which the computer handles as a CD-ROM drive that can load auto-run applications. Hence, the hack can automatically infect Windows PCs. This attack is valid on any USB autorun disk. Once installed, hacksaw downloads the contents of any inserted flash. Then, it silently archives the stolen data, establishes a connection to a smtp.gmail.com address, and uploads stolen data. Finally, it removes all traces of its presence. A more dangerous version can propagate onto any installed drive, thus enabling it to infect other systems. This is the first reported case of an actual USB flash drive driven worm. Some simple measures should mitigate risks. First, deactivate Autorun. For instance, hold down the Shift key when plugging a nontrusted USB device into your computer. Second, do not trust unknown PCs or at least make sure that your flash drive has no confidential information. Finally, run up-to-date antivirus software. S. ONNO Virus shares secrets A malware, named Antinny, targets Winny, a popular Japanese file sharing software. Antinny mimics itself as an interesting file for eager file sharers. Once executed, Antinny selects random files on the hard disk, distributes them and then hides itself to propagate further. There are already more than 50 variants of this virus. Many business and security secrets have already been disclosed such as an airport password to a secure area and Japanese defense plans. The recommended countermeasure is to banish Winny from computers. Antinny is the first known virus that exploits the file sharing capabilities of PP networks. Is this a new breed of risk? E. DIEHL

3 Social engineering: the USB way Social engineering refers to the nontechnological attacks that influence someone to reveal a secret [1]. It requires contact, often via the phone, between the attacker and the employee, to exert this influence. A new kind of social engineering-based intrusion attack [] recently appeared. The exploited vulnerability is people s curiosity. The vector is a hacked USB key. Here is the recipe: develop a Trojan that collects interesting information and stealthily send it to a Gmail account. Install the Trojan on USB keys. Disseminate these keys around the targeted company (parking lot, smoker area), as if lost. Then wait for the information to flow into your mailbox. How does it work? An employee finds a USB key, grabs it, and plugs it in his computer. This launches the Trojan that stealthily sends out the critical data. Compared to other social engineering techniques, this attack is easy and cheap to perform on a large scale. Moreover, it is difficult to track the origin of the attack. With the development of new easy-to-use USB hacking tools like Hacksaw, anybody can do it. Think about it the next time you plug in an unknown USB key Y. MAETZ The largest Mersenne prime number Recently two world records for the largest Mersenne prime number were announced: the 3rd and the th Mersenne primes discovered respectively on December 15, 005 and on September, 006, by the same team at the Central Missouri State University (CMSU). The th has 9,808,358 digits and is 650,000 digits larger than the 3rd. Tony Reix, of Bull S.A. Research Center in Grenoble, France using 16 Itanium 1.5 GHz CPUs, verified the records. A Mersenne prime is a prime number that writes as M p = p 1. The exponent p must be prime for M p to be prime, but the converse is not true. These numbers were named for a famous French mathematician Marin Mersenne, who studied these numbers more than 350 years ago. He did not invent the Mersenne numbers, but he provided a list of those that are prime until the 57th exponent. Unfortunately, the list was not correct: he wrongly included 67 and 57, and missed 61, 89 and 187. Mersenne primes have the remarkable property that every such prime corresponds to exactly one perfect number, i.e.: numbers equal to the sum of their proper divisors. If M p is a Mersenne prime then M p. (M p +1)/ is a perfect number. For instance, 6 = 1xx3 = 1++3 is a perfect number which correspond to Mersenne prime M = -1 = 3. The Electronic Frontier Foundation (EFF) offers # Name Exponent p Digits Discovery Discoverer a $100,000 award for the first 10- million-digit prime number. This last record was very near to taking home the award. The table below lists the last ten known Mersenne primes, their discovery dates and those who discovered them. Mersenne prime searches have led to important advances in Fast Fourier Transforms as well as discovering computer hardware problems via rigorous stress testing. Moreover, finding large primes is at the heart of public key cryptography. Mersenne primes permit efficient implementation of arithmetic operations (e.g. modular exponentiation in Elliptic Curve cryptography). M. KARROUMI 1 M35 1,398,69 0,91 Nov. 1, 1996 Joel Armengaud/GIMPS M36,976,1 895,93 Aug., 1997 Gordon Spence/GIMPS 3 M37 3,01, ,56 Jan. 7, 1998 Roland Clarkson/GIMPS M38 6,97,593,098,960 Jun. 1, 1999 Nayan Hajratwala/GIMPS 5 M39 13,66,917,053,96 Nov. 1, 001 Michael Cameron/GIMPS 6 M0 0,996,011 6,30,30 Nov. 17, 003 Michael Shafer/GIMPS 7 M1,036,583 7,35,733 May 15, 00 Josh Findley/GIMPS 8 M 5,96,951 7,816,30 Feb. 18, 005 Martin Nowak/GIMPS 9 M3 30,0,57 9,15,05 Dec. 15, 005 Curtis Cooper and Steven Boone/GIMPS 10 M 3,58,657 9,808,358 Sep., 006 Curtis Cooper and Steven Boone/GIMPS Table 1: The last ten Mersenne prime records Recovering secrets via simple branch prediction analysis Recent press releases reported a new security flaw that could affect the security of Internet transactions. O. Acıiçmez, Ç.K. Koç, and J.-P. Seifert pointed this flaw out improving on their previous results, which will be presented at RSA007. The authors exploit branch prediction capabilities that are present in modern computer architecture to boost their performance. The timing information resulting from a correct or incorrect prediction is then used in a discriminatory way to extrapolate secret information. This attack was applied to an OpenSSL RSA implementation and allowed to collect almost all the secret key bits from a single RSA signing execution. We will analyze this attack in the next issue of the Security Newsletter. M. JOYE

4 The DRM war: news from the front lines Recently, Windows DRM and Apple s FairPlay were successfully cracked. This article analyzes the attacks, the associated threats and the counter strikes. The first version of Windows DRM appeared in 1999, the latest version, DRM v10, arrived in 00. Though regularly cracked, protection is regularly updated. DRM v10 was already cracked in 005, but the hack was not easily usable for non-specialists. In August 006, FairUseWM software appeared that is very simple to use. Removing protection from a file requires only few mouse clicks. Actually, FairUseWM calls the Windows Media Player. When the Windows Media Player reads a protected file, it stores the decryption key in memory. FairUseWM recovers the key from this memory. Nine days after the FairUseWM appeared, Microsoft proposed an update countering this software. We can conclude that Microsoft did not consider modifying its DRM to counter this vulnerability as long as the vulnerability was not perceived as exploitable. Unfortunately, three days later, a new version of FairUseWM appeared that again broke the DRM protection. A hypothesis to explain the quick reaction of the anonymous FairUseWM author is that the vulnerability used is unknown to Microsoft. Thus, the patch did not correct the vulnerability but just disturbed FairUseWM software. Interestingly, FairUseWM software is itself protected against reverse engineering (the method used to understand the internal algorithm of software). The author hides how his software works probably to hide the exploited vulnerability. Only Apple devices have access to the music sold by istore. Only istore can sell protected music that is usable on Apple devices. A perfect synergy to sell Apple devices. Famous hacker DVD Jon threatens this control. DVD Jon cracked the protection of the DVD when he was 15 years old. DVD Jon (his true name is Jon Lech Johansen) found vulnerability in the FairPlay protocol. He can retrieve protected content from FairPlay without loss of quality. Even more interesting, he can create FairPlay protected contents. Software like QTFairUse6 retrieves protected content. QTFaireUse6 launches itunes and reads the unprotected song from RAM memory. Other software like jhymn can directly retrieve songs by deciphering content but only for itunes 6 and not for itunes 7. Using this hack, any music provider could sell FairPlay protected music without Apple and thus gain access to ipod s marketplace. Manufacturers of portable music of portable music readers could enable users to buy music on istore and still use their devices. Apple s business model of dependence is under attack. Microsoft sued the anonymous author of the FairUseWM software. Strangely, Apple has not yet sued Jon Lech Johansen. A possible explanation could be the consequence if Apple would lose the case. If that happened, Apple s competitors could legally threaten Apple s monopoly. O. COURTAY Fingerprinting and filtering Theory to practice: an audio/video fingerprint A multimedia fingerprint feature extraction algorithm typically consists of six modules: preprocessing, segmentation, transformation, feature extraction, postprocessing and modeling. First, the original content is converted into a normalized digital format. Then the signal is segmented into periods taking into account the stationary of the underlying acoustic/ visual features. This process ensures robustness against misalignment in the time domain during matching process. In the next step, the sample is transformed (the frequency domain), in order to reduce redundancy. Representative features are extracted using the perceptually relevant parameters of the human auditory/visual system. The aim of the post-processing is to normalize measurements and to ease fingerprint matching. To facilitate the matching process, modeling the fingerprint is a pre-condition for selecting the appropriate distance metric for the matching process. The research challenge is to design a robust fingerprint that enables a fast searching mechanism in a database with millions of fingerprints. What is the state-of-the-art content filtering technology? Identifying and filtering video/audio content has become a hot topic for online multimedia entertainment websites. Copyright owners fight illegal distribution over file sharing sites such as YouTube, GUBA, MySpace, imesh and Snocap. To manage the digital rights and upload control, YouTube, GUBA and MySpace developed innovative filtering based on fingerprinting. To secure their business, the four main actors in online file sharing negotiated with copyright owners: YouTube with CBS Corp, Warner Music Group, Vivendi s Universal Music Group and Sony BMG Music Entertainment. MySpace with FOX and Major League Baseball (they also announced a partnership with Snocap). GUBA with Sony, Warner Bros and more recently the MPAA. Snocap with Universal Music Group, Warner Music Group, SONY BMG Music Entertainment, EMI, TVT Records, Artemis Records/ Sheridan Square Entertainment, and independent music companies. A content-filtering technology is efficient if a movie or a music track is identified by its content instead of its binary representation. It should not depend on format, resolution or file size of the content. This is extremely challenging. Ronald Maandonks, CEO of Philips Content Identification Unit, explains that distortions, also called attacks, make the matching process difficult: The process is pretty simple when the content is the exact same; it s much more challenging when the content has been changed due to scaling, cropping or conversion to another comprehension format. For instance, GUBA developed an inhouse perceptual hash technology, called Johnny [3] based on spatial-temporal wavelet decomposition. Regarding

5 the scene changes, the video is split into fragments (also called snapshots) and compressed into a more compact representation of the so-called time fingerprint. Each fingerprint is stored in a database. When a video is uploaded to the GUBA website, Johnny transcodes the uploaded file into their own format, extracts the time signature and automatically compares it to the database. In the case of correct matching, the video is flagged for human verification. Human examination shows that 1% of flagged content is identified as false positive (not copyrighted). GUBA also claims an accuracy of 90% when a video sample exceeds 3 minutes. Accuracy rate is a complex topic. It depends highly on the context: duration of the original sequence, duration of the copy, manipulations (attacks) applied to the original. The stronger the attack - a camcorder for example - the harder it is to correctly identify a copy. According to Rob Bennett, general manager of MSN Entertainment, Microsoft is working on a similar technology to monitor content available on MSN Soapbox, a YouTube-like platform. This online file sharing site is currently in beta version. The PP network imesh adopted an audio fingerprint technology from Audible Magic. Audible Magic, GraceNote and Relatable are the main actors in audio fingerprinting. Audible Magic recently licensed video fingerprint technology called Motional Media ID invented by David W. Stebbings (ex-senior Vice President of Technology for the RIAA). MPAA will be benchmarking video and audio fingerprint algorithms []. All major actors, including Thomson, are expected to be candidates. The MPAA will take into consideration realistic attacks (camcorder, scaling, frame rate changes, DivX compression) and usage scenarios (PP: full-length video and online file sharing: snippets of video). F. LEFEBVRE, M. ARNOLD Anti-piracy in theaters According to the Motion Picture Association of America (MPAA), Hollywood loses billions of dollars a year on illegal copies of movies. It is difficult to evaluate precisely the real loss. Any pirated copy arriving on the black market during the exploitation window - when the film is in the theaters - will have direct impact on studio profit. Furthermore, illegal copies already affect future DVD sales, which represent more than 60% of revenue for a blockbuster. Among all forms of piracy, illegal intheater camcording represents a major attack. Pirated DVDs, using camcorded bootlegs, are on the black market very soon after the opening of a movie. The pirate industry is very efficient; a film shot in a US theater is sent to Asia for DVD replication and back to the US to be sold roughly three or four days later. The quality of a camcorder copy can vary greatly. At one extreme, when the pirate has the cooperation of a theatre employee, the quality can be so good that a buyer or viewer of this content may not be aware that it is an unauthorized copy. At the other extreme, the copy can be blurry, warped, cropped and can even contain the heads of other audience members. The audio can similarly contain auditorium and audience noise. However, if the price is low enough, the customer often will accept a relatively high degree of degradation. There are three main ways to prevent illegal camcording in theatres. The first is to detect a recording camcorder in the theatre. There are some low-tech solutions such as screening at the entry of the theater or night vision goggles. Several companies have already proposed more high-tech approaches: the detection of camcorder electronic signatures or the detection of optic elements, are trails currently followed by researchers. This track is very challenging. To remain discreet, the pirates must be creative in their art of stealth. It is very difficult to distinguish a camcorder from other legitimate devices that could be present in a theatre. It is difficult to optically distinguish the lens of a camcorder from a pair or eyeglasses. It is clear that false positive detections remain a problem for any of these technologies. A well-known social engineering technique is to voluntarily trigger a large bunch of false positive events. After a while, the guardians will give up. Nevertheless, the potential of such approaches remains high as they have the great advantage of being independent of the projection technology and thus independent of the evolution from analog to digital. The second approach is to flood the camcorder sensors by emitting infrared beam lights towards the audience. A simple countermeasure is to add the right infrared filter on the lens. However, this approach may thwart most novice pirates. The third approach is to degrade the quality of the recorded content. This is extremely challenging. The anticamcorder technology must fulfill several requirements: It must be transparent to legitimate spectators in the theatre; a group that includes golden eyes and color blind viewers. The technology cannot introduce any perceptible artifacts into the content. The recorded distortion must be disturbing enough to discourage the pirate. We have seen that pirates will accept poor quality copies, but the message such as illegal copy appearing can also have a deep impact in the value of illegal material. It must be effective on all camcorders. Once these basic technical requirements are met (invisibility and a discouraging jamming effect), other requirements are mandatory to transform a technology into a success story: Robustness to removal attempts. Upgradeability of the system to be ahead in the race with pirates. Low additional cost of technology

6 Robustness means that the pirate must not be able to use processing tools to remove the jamming effect. If it is possible, then at least it must take many days to achieve. Anti-camcorder technology would be successful if a delay of at least two weeks happened to the availability of pirated DVDs. The additional cost for technology introduction is a challenge. Current efforts are focused on digital projection environments, as the required signal processing technology is readily available in that environment. This is an advantage since most theatres will migrate towards digital cinema in the coming years, but it is mandatory not to miss this window. Technical solutions that modify the displayed content influence the architecture of both server and projector. It can require significant changes in the optical engine of the projector, in the addressing scheme of the DMD or in the data path of the server. All of these aspects require a strong collaboration with manufacturers including Texas Instruments for DLP projectors. These manufacturers must be convinced that in the end the additional cost will bring final benefit for all cinema stakeholders. There are two distinct approaches. The first, called temporal modulation approach, exploits one difference between the camcorder and the human eye. The camcorder is a sampling device, whereas the human eye is not. Shannon s theorem says that the aliasing effect appears if we sample any signal having a frequency above half the sampling frequency. For a 60Hz camcorder it means any frequency above 30Hz. The idea is then to introduce a signal higher than 30Hz inside the video content. This is technically possible thanks to flexibility of the addressing scheme of DLP projectors which can display pictures at 1Hz. The first requirement for anticamcorder technology is to remain invisible to the spectator. The frequency modulation must be set in a range where the eye does not perceive it. This means above the flicker sensitivity curve of the eye, i.e. above 50Hz. There is a range of frequency, between 50Hz and 60Hz, where the temporal modulation can introduce aliasing on camcorder without being visible to the eye. Unfortunately, the sensitivity curve is only correct in static conditions. When we move our eyes or even when we eat popcorn, the continuous integration of the eye is modified and we are able to distinguish frequencies higher than 50Hz. Another limitation is the electronic shutter of camcorders. Some camcorders have adjustable electronic shutters with variable integration periods (e.g., up to 1/15s). This trick introduces a blurring effect and reduces the amount of aliasing introduced. The second approach, called metamerism approach, exploits the difference between a camcorder and the human eye in the color domain. Metamerism is the capacity of the eye to perceive the same color even if the visual spectrum that generates this perception is different. In other words, we can create the same yellow perception for the eye with a 3-primary projector (RGB) or with a -primary projector (RGB + Cyan primary for instance). Meanwhile, the camcorder has only three sensors (RGB) with fixed sensitivity curves. In general, it does not perceive color the same as the human eye. If a part of the picture is displayed with the 3-primary system and the rest with the -primary, the eye will not perceive any difference. On the other hand, the camcorder will get a disrupted picture. The primary challenge is invisibility. As this method relies on color perception, the wide variation of color perception in the population must be considered. Color blindness introduces an interesting subpopulation. Within the constraints of transparency, a successful technology will introduce significant color distortion in the camcorder capture. Implementation cost is a significant challenge. Using more than three primaries in the projection system requires a modification of the optical engine of the projector. An intermediate solution uses a second projector. Nevertheless, the final solution should integrate the four primaries in the same projector. In conclusion, anti-camcording technology is mandatory to prevent piracy in the cinema business. Several approaches are possible with their corresponding technical challenges and limitations. Nothing is easy but solutions are possible. This is a promising battlefield. D. DOYEN, J. BLOOM Where will we be? Bertrand Chupeau, Ayoub Massoudi and Frédéric Lefèbvre, Automatic Estimation and Compensation of Geometric Distortions in Video Copies, Visual Communications and Image Processing 007, San Jose, California, USA, January 8 - February 1, 007 Jun Tian and Jeffrey A. Bloom, A Marker Code for Temporal Synchronization, Security and Watermarking of Multimedia Contents IX, San Jose, California, USA, January 8 - February 1, 007 Benoît Chevallier-Mames and Marc Joye, A Practical and Tightly Secure Signature Scheme Without Hash Function, RSA Conference 007, San Francisco, USA, February 5-9, 007 References [1] K. Mitnick, The Art of Deception: Controlling the Human Element of Security [] Steve Stasiukonis, Secure Network Technologies Inc. asp?doc_id=95556 [3] com []

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.

Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12. Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com

DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com DIGITAL WATERMARKING: FOSTERING AND ENHANCING LEGITIMATE PEER-TO-PEER (P2P) ECOSYSTEMS DIGIMARC CORPORATION 9405 SW Gemini Drive Beaverton, Oregon 97008 www.digimarc.com Copyright 2006 1 TABLE OF CONTENTS

More information

Secure Data Exchange Solution

Secure Data Exchange Solution Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates

More information

The Mathematics of the RSA Public-Key Cryptosystem

The Mathematics of the RSA Public-Key Cryptosystem The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through

More information

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Side Channel Analysis and Embedded Systems Impact and Countermeasures Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side

More information

The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director sfrei@secunia.com

The Fundamental Failures of End-Point Security. Stefan Frei Research Analyst Director sfrei@secunia.com The Fundamental Failures of End-Point Security Stefan Frei Research Analyst Director sfrei@secunia.com Agenda The Changing Threat Environment Malware Tools & Services Why Cybercriminals Need No 0-Days

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst. Cryptographic Algorithms and Key Size Issues Çetin Kaya Koç Oregon State University, Professor http://islab.oregonstate.edu/koc koc@ece.orst.edu Overview Cryptanalysis Challenge Encryption: DES AES Message

More information

MovieLabs Specification for Enhanced Content Protection Version 1.0

MovieLabs Specification for Enhanced Content Protection Version 1.0 MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda

More information

Experimental DRM Architecture Using Watermarking and PKI

Experimental DRM Architecture Using Watermarking and PKI Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,

More information

Security and protection of digital images by using watermarking methods

Security and protection of digital images by using watermarking methods Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking

More information

SoMA. Automated testing system of camera algorithms. Sofica Ltd

SoMA. Automated testing system of camera algorithms. Sofica Ltd SoMA Automated testing system of camera algorithms Sofica Ltd February 2012 2 Table of Contents Automated Testing for Camera Algorithms 3 Camera Algorithms 3 Automated Test 4 Testing 6 API Testing 6 Functional

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches

More information

Protection for Mac and Linux computers: genuine need or nice to have?

Protection for Mac and Linux computers: genuine need or nice to have? Protection for Mac and Linux computers: genuine need or nice to have? The current risk to computers running non-windows platforms is small but growing. As Mac and Linux computers become more prevalent

More information

Practical guide for secure Christmas shopping. Navid

Practical guide for secure Christmas shopping. Navid Practical guide for secure Christmas shopping Navid 1 CONTENTS 1. Introduction 3 2. Internet risks: Threats to secure transactions 3 3. What criteria should a secure e-commerce page meet?...4 4. What security

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

Authentication requirement Authentication function MAC Hash function Security of

Authentication requirement Authentication function MAC Hash function Security of UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy

More information

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

SanDisk Enterprise Secure USB Flash Drive Security Vulnerability

SanDisk Enterprise Secure USB Flash Drive Security Vulnerability SanDisk Enterprise Secure USB Flash Drive Security Vulnerability Device CD-ROM partition can be a host for malware and crimeware February 2009 Introduction After my recent experiences with the Read Only

More information

Technical Standards for Information Security Measures for the Central Government Computer Systems

Technical Standards for Information Security Measures for the Central Government Computer Systems Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...

More information

M-Shield mobile security technology

M-Shield mobile security technology Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a

More information

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE CPSC 467a: Cryptography and Computer Security Notes 1 (rev. 1) Professor M. J. Fischer September 3, 2008 1 Course Overview Lecture Notes 1 This course is

More information

Safer data transmission using Steganography

Safer data transmission using Steganography Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: arul.bharathi@yahoo.com,

More information

CRYPTOGRAPHY IN NETWORK SECURITY

CRYPTOGRAPHY IN NETWORK SECURITY ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can

More information

Anti-Virus Comparative

Anti-Virus Comparative Anti-Virus Comparative Performance Test Impact of Anti-Virus Software on System Performance Microsoft Forefront Endpoint Protection (Release Candidate) Language: English November 2010 Last Revision: 13

More information

Fighting product clones through digital signatures

Fighting product clones through digital signatures Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover

More information

The Misuse of RC4 in Microsoft Word and Excel

The Misuse of RC4 in Microsoft Word and Excel The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore hongjun@i2r.a-star.edu.sg Abstract. In this report, we point out a serious security flaw in Microsoft

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Secure USB Flash Drive. Biometric & Professional Drives

Secure USB Flash Drive. Biometric & Professional Drives Secure USB Flash Drive Biometric & Professional Drives I. CONTENTS II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE FLASH DRIVE... 3 DESCRIPTION... 3 IV. MODULES OF SECURE

More information

Protect your personal data while engaging in IT related activities

Protect your personal data while engaging in IT related activities Protect your personal data while engaging in IT related activities Personal Data (Privacy) Ordinance Six Data Protection Principles Principle 1 purpose and manner of collection of personal data Collection

More information

Deep Security Vulnerability Protection Summary

Deep Security Vulnerability Protection Summary Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security

More information

Self-Encrypting Hard Disk Drives in the Data Center

Self-Encrypting Hard Disk Drives in the Data Center Technology Paper Self-Encrypting Hard Disk Introduction At least 35 U.S. states now have data privacy laws that state if you encrypt data-at-rest, you don t have to report breaches of that data. U.S. Congressional

More information

Comparison of Enterprise Digital Rights Management systems

Comparison of Enterprise Digital Rights Management systems Comparison of Enterprise Digital Rights Management systems M.H. van Beek Master Thesis Computer Science MT Advice report Aia Software Thesis number 565 June 22, 2007 Radboud University Nijmegen Computer

More information

Hackers: Detection and Prevention

Hackers: Detection and Prevention Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik

More information

128-Bit Versus 256-Bit AES Encryption

128-Bit Versus 256-Bit AES Encryption Technology Paper 128-Bit Versus 256-Bit AES Encryption Authentication Module Encryption Engine Background There is some confusion around the market for full disk encryption (FDE) products. Seagate Technology

More information

Getting a Secure Intranet

Getting a Secure Intranet 61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like

More information

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link) NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Security in Android apps

Security in Android apps Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC

More information

2012 Bit9 Cyber Security Research Report

2012 Bit9 Cyber Security Research Report 2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by

More information

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from http://www.antiphishing.org/ DB1 Phishing attacks, usually implemented through HTML enabled e-mails, are becoming more common and more sophisticated. As a network manager, how would you go about protecting your users from a phishing

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

Data Security 2. Implement Network Controls

Data Security 2. Implement Network Controls UNIT 19 Data Security 2 STARTER Consider these examples of computer disasters. How could you prevent them or limit their effects? Compare answers within your group. 1 You open an email attachment which

More information

CipherShare Features and Benefits

CipherShare Features and Benefits CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application

More information

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures Outline Computer Science 418 Digital Signatures Mike Jacobson Department of Computer Science University of Calgary Week 12 1 Digital Signatures 2 Signatures via Public Key Cryptosystems 3 Provable 4 Mike

More information

Security in Near Field Communication (NFC)

Security in Near Field Communication (NFC) Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com

More information

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits

Executive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Brief for Sharing Sites & Digital Content Providers Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Summary The Opportunity/Challenge The revenue

More information

ERNW Newsletter 29 / November 2009

ERNW Newsletter 29 / November 2009 ERNW Newsletter 29 / November 2009 Dear Partners and Colleagues, Welcome to the ERNW Newsletter no. 29 covering the topic: Data Leakage Prevention A Practical Evaluation Version 1.0 from 19th of november

More information

Local Government Cyber Security:

Local Government Cyber Security: Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and

More information

Aegis Padlock for business

Aegis Padlock for business Aegis Padlock for business Problem: Securing private information is critical for individuals and mandatory for business. Mobile users need to protect their personal information from identity theft. Businesses

More information

3-6 Toward Realizing Privacy-Preserving IP-Traceback

3-6 Toward Realizing Privacy-Preserving IP-Traceback 3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems

More information

Turn pirates into customers and increase your sales. Solutions by Sony DADC

Turn pirates into customers and increase your sales. Solutions by Sony DADC Turn pirates into customers and increase your sales Solutions by Sony DADC A large and growing audience is consuming your DVD and Blu-ray titles for free by illegitimately copying, ripping and downloading.

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies 1720 - Forward Secrecy: How to Secure SSL from Attacks by Government Agencies Dave Corbett Technical Product Manager Implementing Forward Secrecy 1 Agenda Part 1: Introduction Why is Forward Secrecy important?

More information

Studying Security Weaknesses of Android System

Studying Security Weaknesses of Android System , pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced

More information

White Paper - Crypto Virus. A guide to protecting your IT

White Paper - Crypto Virus. A guide to protecting your IT White Paper - Crypto Virus A guide to protecting your IT Contents What is Crypto Virus?... 3 How to protect yourself from Crypto Virus?... 3 Antivirus or Managed Agents... 3 Enhanced Email Services & Extra

More information

Securing Data on Portable Media. www.roxio.com

Securing Data on Portable Media. www.roxio.com Securing Data on Portable Media www.roxio.com Contents 2 Contents 3 Introduction 4 1 The Importance of Data Security 5 2 Roxio Secure 5 Security Means Strong Encryption 6 Policy Control of Encryption 7

More information

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide

Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:

More information

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis

CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems

More information

Sustainable Device Security:

Sustainable Device Security: Last modification: 03-03-2014 / 11:55 AM GMT+01:00 White Paper Media Protection Multiscreen Sustainable Device Security: Breaking the Hacker Business Model with Software Security February 2013 www.irdeto.com

More information

2007 Microsoft Office System Document Encryption

2007 Microsoft Office System Document Encryption 2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft

More information

Countering the Threat to the Digital Lifestyle

Countering the Threat to the Digital Lifestyle Encryption and USB Drives: Whitepaper Countering the Threat to the Digital Lifestyle Encryption and USB Drives 8GB of Data 2,000 songs - or your company marketing strategies 2,500 vacation pictures - or

More information

CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER WWW.KRAMERUS.COM

CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER WWW.KRAMERUS.COM CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER WWW.KRAMERUS.COM Executive Summary There has been a fundamental shift in how people collaborate in today

More information

Information Security Holger Schlingloff Jan 30th, 2002 1 Information security and copyright Why is there a connection? Remember definition from the very beginning: Similar to material objects, some informations

More information

Secure Streaming Media and Digital Rights Management

Secure Streaming Media and Digital Rights Management Secure Streaming Media and Digital Rights Management Deepali Holankar Department of Computer Science San Jose State University San Jose, CA 95192 dbrahmbhatt@pacbell.net Mark Stamp Department of Computer

More information

Prof. Dr. M. H. Assal

Prof. Dr. M. H. Assal Prof. Dr. M. H. Assal AS 26/10/2014 Computer hardware is the collection of physical elements that comprise a computer system Computer hardware can be classified as following: o Input devices o Output devices

More information

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One

Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content Filtering (WCF) for superior

More information

Fuzzy Keyword Search over Encrypted Stego in Cloud

Fuzzy Keyword Search over Encrypted Stego in Cloud International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-02 E-ISSN: 2347-2693 Fuzzy Keyword Search over Encrypted Stego in Cloud TanmayDahake 1*, MirsohailShaikh

More information

Protecting personally identifiable information: What data is at risk and what you can do about it

Protecting personally identifiable information: What data is at risk and what you can do about it Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most

More information

Develop Computer Animation

Develop Computer Animation Name: Block: A. Introduction 1. Animation simulation of movement created by rapidly displaying images or frames. Relies on persistence of vision the way our eyes retain images for a split second longer

More information

Banking Security using Honeypot

Banking Security using Honeypot Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information

More information

Data Storage Security in Cloud Computing

Data Storage Security in Cloud Computing Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: prashantpatil11@rediffmail.com ABSTRACT

More information

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform Next Generation Surveillance Solutions Cware The Advanced Video Management & NVR Platform Advanced Open Management Benefit from the most effective CCTV management platform Cware is an advanced video management

More information

Dashlane Security Whitepaper

Dashlane Security Whitepaper Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.

More information

Is Your SSL Website and Mobile App Really Secure?

Is Your SSL Website and Mobile App Really Secure? Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

Data loss prevention and endpoint security. Survey findings

Data loss prevention and endpoint security. Survey findings Data loss prevention and endpoint security Survey findings Table of Contents Overview 3 Executive summary 4 Half of companies have lost confidential information through removable media 5 Intellectual property

More information

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from

More information

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500 INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information

More information

More effective protection for your access control system with end-to-end security

More effective protection for your access control system with end-to-end security More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT

More information

PDF Forms Advantages and application possibilities of electronic forms in PDF format

PDF Forms Advantages and application possibilities of electronic forms in PDF format White Paper PDF Forms Advantages and application possibilities of electronic forms in PDF format Copyright 2002-2009 soft Xpansion GmbH & Co. KG White Paper PDF Forms 1 Table of Contents Usage of Forms...

More information

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst

RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents

More information