An Introduction to Digital Identity
|
|
|
- Robert O’Neal’
- 10 years ago
- Views:
Transcription
1 1 An Introduction to Digital Identity Andreas Pfitzmann Dresden University of Technology, Department of Computer Science, D Dresden Nöthnitzer Str. 46, Room 3071 Phone: , Keynote presentation at OECD Workshop on Digital Identity Management Trondheim, Norway, May 8, 2007
2 An Introduction to Digital Identity 2 Digital identity of what? is set of attributes Partial Identities (pids) for privacy how to use? Attributes: Important kinds of Possible classifications Example: How to (not) use biometrics How to represent identity online? How to manage your identity online? Identity management framework needed
3 Digital identity of what? 3 Digital identity of Natural person, Legal person, or Computer
4 Digital identity is? 4 Digital identity is much more than Names (easy to remember), Identifiers (unique), and Means of authentication (secure).
5 Digital identity is... 5 Digital identity primarily is a set of attributes, where some might change over time and some may be certified by third parties. Given that it is very hard if not impossible to erase widely used digital data, a digital identity is only growing never shrinking. This is true both for a global observer as well as for each party (or set of parties pooling their information) interacting with a digital identity.
6 Partial Identities (pids) 6 Achieving security and privacy requires users to subset their digital identity in so-called Partial Identities (pids), where each pid might have its own name, own identifier, and own means of authentication.
7 Using pids requires... 7 Basic understanding by users (and by government and businesses), At least one personal computer administrating personal data and executing cryptographic protocols fully controlled by the user (otherwise no way to validate privacy properties, i.e. unlinkable pids), Digital pseudonyms for secure authentication (otherwise no way to achieve accountability), Anonymous credentials to transfer certified attributes from one pid to another pid of the same digital identity (otherwise no transfer of certified attributes between pids, which drastically reduces their applicability).
8 Important kinds of attributes 8 Names (easy to remember), Identifiers (unique), Means of authentication (secure) Digital pseudonyms are unique identifiers suited to test authentication (e.g. public keys of PGP) Biometrics (binding to natural person) Addresses (useful for communication) Bank account (payment) Credit card number (payment and creditworthiness)
9 Possible classifications of attributes 9 Authenticated by third parties or not? If authenticated by third parties, third parties trusted by whom wrt what? Easy to change or not? Varying over time or not? Given attributes vs. chosen attributes Pure attributes vs. attributes containing side information Characterizing a single entity per se or an entity only in its relationship to other entities?
10 How much protection for which attributes? 10 Some attributes need much more protection than others, e.g. those which are not easy to change, do not vary over time, are given attributes, or contain side information. These attributes are part of the core-identity. Advancements and use of technology may shift some attributes from core-identity to non-core identity, e.g. the address of your house or flat is core, the current address of your laptop maybe not.
11 An eternal core-identity attribute: Biometrics 11 Biometrics is an important example of an eternal coreidentity attribute How to (not) use biometrics therefore is an interesting case study Main result: Biometrics between data subject and his/her devices only Authentication by possession and/or knowledge and biometrics No devaluation of classic forensic techniques (e.g. by foreign devices reading fingerprints, digital copies will make it into databases of foreign secret services and organized crime, enabling them to leave dedicated false fingerprints at the scenes of crime) No privacy problems caused by biometrics (measurements may contain medical or psychological side information) But: Safety problem remains unchanged Provide possibility to switch off biometrics after successful biometric authentication.
12 How to represent identity online? 12 Only partial identities otherwise Big Brother (or Little Sisters) will be quite happy (Digital) Pseudonyms as identifiers for partial identities How to establish and use (digital) pseudonyms Initial linking between the pseudonym and its holder Linkability due to the use of the pseudonym in different contexts
13 Pseudonyms: Initial linking to holder 13 Public pseudonym: The linking between pseudonym and its holder may be publicly known from the very beginning. Phone number with its owner listed in public directories Initially non-public pseudonym: The linking between pseudonym and its holder may be known by certain parties (trustees for identity), but is not public at least initially. Bank account with bank as trustee for identity, Credit card number... Initially unlinked pseudonym: The linking between pseudonym and its holder is at least initially not known to anybody (except the holder). Biometric characteristics; DNA (as long as no registers)
14 Pseudonyms: Use in different contexts => partial order 14 number of an identity card, social security number, person pseudonym bank account linkable role pseudonym pen name, employee identity card number relationship pseudonym role-relationship pseudonym contract number transaction pseudonym one-time password, TAN customer number increasing unlinkability of transactions! increasing available anonymity unlinkable A B stands for B enables stronger anonymity than A
15 Trustee for values vs. Trustee for identities 15 Accountability of digital pseudonyms (by depositing money to cover claims against damage caused under that pseudonym) vs. Accountability of holders of digital pseudonyms (by identifying holders in case of uncovered damage) Cf. Holger Bürk, Andreas Pfitzmann: Value Exchange Systems Enabling Security and Unobservability; Computers & Security 9/8 (1990)
16 How to manage your identity online? 16 Get attentive to managing your identity, i.e. your pids (otherwise others will manage you) Consider both, reputation and privacy, make a compromise Get the right tools Privacy-enhancing identity management tools, cf. FP6 EU-Project PRIME Communication infrastructure, which does not define permanent identifiers attached to you (your network address) making privacy-enhancing identity management at the application layer void Choose the right communication partners (including: avoid those which are unnecessarily privacy-invasive)
17 Identity management framework needed 17 Now, we have an identity management patchwork. As security is only as good as the weakest link of the chain, privacy is at most as good as the most privacy-invasive layer you are using. Therefore, an identity management patchwork will not lead to secure and privacy-enhancing identity management. An identity management framework is needed addressing both, security and privacy.
18 Further reading 18 The following backup slides are taken from:
19 Authenticated anonymous declarations between business partners that can be de-anonymized trusted third party A trusted third party B 19 identification user X confirmation document know p G (X,g) for p G (Y,g) p A p G (X,g) confirmation document for p G (X,g) p G (Y,g) know p G (Y,g) p B identification user Y
20 Authenticated anonymous declarations between business partners that can be de-anonymized trusted third party A trustees for identities trusted third party B 20 identification user X confirmation document know p G (X,g) for p G (Y,g) p A p G (X,g) confirmation document for p G (X,g) p G (Y,g) know p G (Y,g) p B identification user Y
21 Security for completely anonymous business partners using active trustee who can check the goods 21 [ 1 ] order merchant is p L (Y,g) + money for merchant trustee T [ 4 ] delivery to customer [ 3 ] delivery to trustee p L (Y,g) [ 2 ] order of the customer (money is deposited) p T p K (X,g) checked by T p T [ 5 ] money p T customer X merchant Y
22 Security for completely anonymous business partners using active trustee who can not check the goods 22 [ 1 ] order delivery is p L (Y,g) + money for distributor trustee T [4.1] wait [ 4 ] delivery to customer [ 3 ] delivery to trustee p L (Y,g) [ 2 ] order of the customer (money is deposited) p T p K (X,g) checked by T p T [ 5 ] money p T customer X merchant Y
23 Security for completely anonymous business partners using active trustee who can (not) check the goods 23 trustee for values [ 1 ] order delivery is p L (Y,g) + money for distributor trustee T ([4.1] wait) [ 4 ] delivery to customer [ 3 ] delivery to trustee p L (Y,g) [ 2 ] order of the customer (money is deposited) p T p K (X,g) checked by T [ 5 ] p T money p T customer X merchant Y
24 Personal identifier authorizes A: A notifies 845: 845 pays B B certifies 845: C pays 845
25 Role-relationship and transaction pseudonyms authorizes A: A notifies 762: 451 pays B B certifies 451: B certifies 314: C pays 314
26 Encryption in layer models 26 In the OSI model it holds: Layer n doesn t have to look at Data Units (DUs) of layer n+1 to perform its service. So layer n+1 can deliver (n+1)-dus encrypted to layer n. For packet-oriented services, the layer n typically furnishes the (n+1)-dus with a n-header and possibly with an n- trailer, too, and delivers this as n-du to layer n-1. This can also be done encrypted again. layer n+1 layer n n-header (n+1)-du encryption n-du n- trailer encryption and so on. All encryptions are independent with respect to both the encryption systems and the keys. layer n-1 (n-1)-du
27 Arranging it into the OSI layers (1) 27 user station exchange exchange user station OSI layers 7 application 6 presentation 5 session 4 transport end-to-end encryption end-to-end encryption 3 network 2 data link 1 physical link encryption link encryption link encryption link encryption 0 medium
28 Arranging it into the OSI layers (2) 28 OSI layers broadcast query MIX-network DC-network RINGnetwork 7 application 6 presentation 5 session 4 transport implicit addressing implicit addressing 3 network broadcast query and superpose buffer and re-encrypt 2 data link anonymous access anonymous access 1 physical channel selection superpose keys and messages digital signal regeneration 0 medium ring has to preserve anonymity against the communication partner end-to-end encryption has to preserve anonymity realizable without consideration of anonymity
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology (Version v0.25 Dec. 6, 2005) Andreas Pfitzmann TU Dresden [email protected]
Device-Centric Authentication and WebCrypto
Device-Centric Authentication and WebCrypto Dirk Balfanz, Google, [email protected] A Position Paper for the W3C Workshop on Web Cryptography Next Steps Device-Centric Authentication We believe that the
Anonymity, Unobservability, Pseudonymity, and Identity Management A Proposal for Terminology
Anonymity, Unobservability, Pseudonymity, and Identity Management A Proposal for Terminology Archives of this Document http://dud.inf.tu-dresden.de/literatur_v1.shtml (v0.5 and all succeeding versions)
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Accordion. Anonymous Peer-to-Peer File Storage
Accordion Anonymous Peer-to-Peer File Storage Morten Franck IT University of Copenhagen [email protected] Peter Gath Hansen IT University of Copenhagen [email protected] Abstract This thesis presents different techniques
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology
Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management A Consolidated Proposal for Terminology (Version v0.28 May 29, 2006) Andreas Pfitzmann TU Dresden [email protected]
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
Multi-Factor Authentication Core User Policy and Procedures
Multi-Factor Authentication Core User Policy and Procedures Core Users with access to other people s sensitive or restrictive information must use one-time passwords (OTP) generated from approved fobs
Multi-Factor Authentication
Making the Most of Multi-Factor Authentication Introduction The news stories are commonplace: Hackers steal or break passwords and gain access to a company s data, often causing huge financial losses to
FIDO Trust Requirements
FIDO Trust Requirements Ijlal Loutfi, Audun Jøsang University of Oslo Mathematics and Natural Sciences Faculty NordSec 2015,Stockholm, Sweden October, 20 th 2015 Working assumption: End Users Platforms
SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security
International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS
CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to
Crypho Security Whitepaper
Crypho Security Whitepaper Crypho AS Crypho is an end-to-end encrypted enterprise messenger and file-sharing application. It achieves strong privacy and security using well-known, battle-tested encryption
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage
Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College
Leveraging Authentication
Leveraging Authentication Annual Workshop on Intelligence and National Security Cyber Security: Vulnerabilities at Home and Abroad October 28, 2009 Securing the Supply Chain Dennis McCallam Principal Architect,
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
The Disadvantages of Free MIX Routes and How to Overcome Them
The Disadvantages of Free MIX Routes and How to Overcome Them Oliver Berthold 1, Andreas Pfitzmann 1, and Ronny Standtke 2 1 Dresden University of Technology, Germany {ob2,pfitza}@inf.tu-dresden.de 2 Secunet,
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication.
Polling Question Briefly describe the #1 problem you have encountered with implementing Multi-Factor Authentication. Please type in your response. This poll will close promptly at 1:00 pm CDT Getting the
NIST E-Authentication Guidance SP 800-63 and Biometrics
NIST E-Authentication Guidance SP 800-63 and Biometrics September 21, 2004 Bill Burr [email protected] OMB M-0404 Guidance on E-Auth Part of E-Government initiative put services online About identity
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
Identity and Access Management Policy
Page 1 of 5 Identity and Access Management Policy Reference number 0605-IAM Interim HEMIS Classification 0605 Purpose Date of implementation 1 December 2012 Review date Previous reviews Policy owner Policy
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
The virtual safe: A user-focused approach to data encryption
The virtual safe: A user-focused approach to data encryption Steganos GmbH, 2008 1 The hard disk: a snapshot of our lives The personal computer has never been more personal. We routinely trust it with
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
Module 8. Network Security. Version 2 CSE IIT, Kharagpur
Module 8 Network Security Lesson 2 Secured Communication Specific Instructional Objectives On completion of this lesson, the student will be able to: State various services needed for secured communication
The Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
Information Security Basic Concepts
Information Security Basic Concepts 1 What is security in general Security is about protecting assets from damage or harm Focuses on all types of assets Example: your body, possessions, the environment,
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Scalable Authentication
Scalable Authentication Rolf Lindemann Nok Nok Labs, Inc. Session ID: ARCH R07 Session Classification: Intermediate IT Has Scaled Technological capabilities: (1971 2013) Clock speed x4700 #transistors
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Digital identity: Toward more convenient, more secure online authentication
Digital identity: Toward more convenient, more secure online authentication For more than four decades, the familiar username/password method has been the basis for authentication when accessing computer-based
Alternative authentication what does it really provide?
Alternative authentication what does it really provide? Steve Pannifer Consult Hyperion Tweed House 12 The Mount Guildford GU2 4HN UK [email protected] Abstract In recent years many new technologies
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
SWIFT: Advanced identity management
SWIFT: Advanced identity management Elena Torroglosa, Alejandro Pérez, Gabriel López, Antonio F. Gómez-Skarmeta and Oscar Cánovas Department of Information and Communications Engineering University of
ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS
ELECTRONIC SIGNATURE REQUIREMENTS FOR LENDERS June 2015 Purpose The Electronic Signatures in Global and National Commerce (ESIGN) Act (15 U.S.C. 7001-7006), enacted in 2000, permits, but does not require,
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
It s All About Authentication
It s All About Authentication An information security white paper to help focus resources where they produce the best results. March 2005 Author: Doug Graham, CISSP Senior Director Blue Ridge Networks,
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department of Information Technology) NOTIFICATION New Delhi, the 11th April, 2011
[ II- खÖड 3(i)] ğ : MINISTRY OF COMMUNICATIONS AND INFORMATION TECHNOLOGY (Department of Information Technology) NOTIFICATION New Delhi, the 11th April, 2011 G.S.R. 313(E). In exercise of the powers conferred
CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS
70 CHAPTER 4 DEPLOYMENT OF ESGC-PKC IN NON-COMMERCIAL E-COMMERCE APPLICATIONS 4.1 INTRODUCTION In this research work, a new enhanced SGC-PKC has been proposed for improving the electronic commerce and
STATE OF WYOMING WOLFS-109(a)
STATE OF WYOMING WOLFS-109(a) The State of Wyoming must have a properly completed form before payment will be made. STATE AGENCY INFORMATION Agency #, Agency Name, Contact Name, Title, Address; Phone #
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)
Understanding Digital Certificates and Wireless Transport Layer Security (WTLS) Author: Allan Macphee January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Group Management Server User Guide
Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Checklist and guidance for a Data Management Plan
Checklist and guidance for a Data Management Plan Please cite as: DMPTuuli-project. (2016). Checklist and guidance for a Data Management Plan. v.1.0. Available online: https://wiki.helsinki.fi/x/dzeacw
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19
Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19 Andrew Sessions, Abel Sussman Biometrics Consortium Conference Agenda
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
What is Auditing? IT 4823 Information Security Administration. Problems. Uses. Logger. Audit System Structure. Logging. Auditing. Auditing November 7
IT 4823 Information Security Administration Auditing November 7 What is Auditing? Logging Recording events or statistics to provide information about system use and performance Auditing Analysis of log
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Advanced Authentication Methods: Software vs. Hardware
Advanced Authentication Methods: Software vs. Hardware agility made possible The Importance of Authenticationn In the world of technology, the importance of authentication cannot be overstated mainly because
SCB Access Single Sign-On PC Secure Logon
SCB Access Single Sign-On PC Secure Logon Manage all your passwords One smart card to access all your applications past & future Multi-factor authentication Dramatically increase your security Save $150
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008
State of Arkansas Policy Statement on the Use of Electronic Signatures by State Agencies June 2008 Background In the last ten years Arkansas has enacted several laws to facilitate electronic transactions
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
9 Simple steps to secure your Wi-Fi Network.
9 Simple steps to secure your Wi-Fi Network. Step 1: Change the Default Password of Modem / Router After opening modem page click on management - access control password. Select username, confirm old password
Signing and Encryption with GnuPG
Signing and Encryption with GnuPG Steve Revilak Cryptoparty @ Northeastern Law School Feb. 9, 2014 1 / 22 What is GnuPG? GnuPG is a free software implementation of the OpenPGP standard. PGP stands for
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
7 Key Management and PKIs
CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 7 Key Management and PKIs 7.1 Key Management Key Management For any use of cryptography, keys must be handled correctly. Symmetric keys must be kept secret.
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST
APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data
BehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
Comodo Disk Encryption
Comodo Disk Encryption Version 2.0 User Guide Version 2.0.122010 Versi Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Comodo Disk Encryption Introduction... 3
October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke
eidas as blueprint for future eid projects cryptovision mindshare 2015 HJP Consulting Holger Funke Agenda eidas Regulation TR-03110 V2.20 German ID card POSeIDAS Summary cryptovision mindshare 2015: eidas
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
An NSTIC-Compliant Identity Ecosystem For Preventing Consumer Identity Theft
An NSTIC-Compliant Identity Ecosystem For Preventing Consumer Identity Theft Executive Summary Bob Pinheiro Robert Pinheiro Consulting LLC [email protected] This note proposes that emerging NSTIC-compliant
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4
NetIQ Advanced Authentication Framework. Maintenance Guide. Version 5.1.0
NetIQ Advanced Authentication Framework Maintenance Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Purposes of Maintenance 3 Difficulties of Maintenance
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
PGP Whole Disk Encryption Training
PGP Whole Disk Encryption Training Agenda WDE Overview Licensing Universal Server & Client Basics Installation Password Recovery OS Maintenance Support Questions 2 Whole Disk Encryption Protects against:
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
EVALUATION GUIDE. Evaluating a Self-Service Password Reset Tool. Usability. The password reality
EVALUATION GUIDE Evaluating a Self-Service Password Reset Tool This guide presents the criteria to consider when evaluating a self-service password reset solution and can be referenced for a new implementation
