End-to-End Enterprise Encryption:
|
|
|
- Gabriel Blake
- 10 years ago
- Views:
Transcription
1 End-to-End Enterprise Encryption: A Look at SecureZIP Technology T E C H N I C A L W H I T E P A P E R WP 700.xxxx
2 Table of Contents SecureZIP Executive Summary SecureZIP: The Next Generation of ZIP PKZIP: The Foundation SecureZIP Implementation of ZIP Encryption Hybrid Cryptosystem Crytopgraphic Calculation Sources Digital Signing In Step with the Data Protection Market s Needs Conclusion
3 End-to-End Enterprise Encryption: A Look at SecureZIP Technology Every day sensitive data is exchanged within your organization, both internally and with external partners. Personal health & insurance data of your employees is shared between your HR department and outside insurance carriers. Customer PII (Personally Identifiable Inmation) is transferred from your corporate headquarters to various offices around the world. Payment transaction data flows between your store locations and your payments processor. All of these instances involve sensitive data and regulated inmation that must be exchanged between systems, locations, and partners; a breach of any of them could lead to irreparable damage to your reputation and revenue. Organizations today must adopt a means mitigating the internal and external risks of data breach and compromise. The required solution must support the exchange of data across operating systems to account both the diversity of your own infrastructure and the unknown infrastructures of your customers, partners, and vendors. Moreover, that solution must integrate naturally into your existing workflows to keep operational cost and impact to minimum while still protecting data end-to-end. SecureZIP, from PKWARE, is that solution. 3
4 SecureZIP: The Next Generation of ZIP PKWARE, Inc., is the creator and continuing innovator of the ZIP standard. For over 20 years, PKWARE has continued to build on the ubiquitous.zip mat. Today, PKWARE addresses the critical need to provide strong data security its customers by adding encryption and signing using NIST 1 -approved algorithms. The result is SecureZIP The Next Generation of ZIP. SecureZIP provides all of the features and capabilities of its predecessor, PKZIP, including efficient data compression, sophisticated file management, and cross-platm capability. SecureZIP allows organizations to address both the continuing need efficient data file management, while adding strong data security. Building on the foundation of ZIP, SecureZIP adds enterprise-class security in a single interoperable solution, across all the major enterprise operating systems: IBM z/os and IBM i ; open systems servers including AIX, HP-UX, Solaris, and Linux ; plus Windows server and client. SecureZIP ensures that inmation is protected throughout your organization, in motion as it is exchanged, or at rest in electronic or physical storage it applies protection directly to the data, not to the network transport or application. Whether you choose to encrypt with passphrases, use a certificate signing and authentication, or both, this data-centric solution provides the flexibility to secure your data using the world-renowned.zip mat. SecureZIP also provides an efficient, easy-touse method to implement data security and file management, whether you are using it on a single desktop or in the world s largest data centers. And since it works on every major enterprise computing platm, it minimizes the cost of managing multiple security products and vendors. Traditional ZIP: The Foundation SecureZIP Phil Katz, the PK of PKZIP, created the.zip mat in the late 1980s as a means to archive files; he included compression to make the process more efficient. Katz s.zip mat became the foundation of all traditional.zip applications. He specifically developed the mat to be extensible in order to maintain inclusion of new compression algorithms, carry metadata necessary to efficiently and effectively extract data, and generally improve upon other technologies. Katz specification states that files are compressed individually, ordered into the archive mat with local header inmation including elements such as a file comment, file name, size, date, etc. Each file is also marked with a four byte signature. Complementarily, the metadata each file is listed in a central directory record holding the file sequence and other metadata, along with a corresponding four byte signature. PKWARE also included encryption support early in the evolution of the product, though the traditional PKZIP 96-bit encryption would not be considered sufficient by contemporary standards. Local File 1 Decryption File 1 Compressed/ Encrypted Data File 1 Local File 2 Decryption File 2 Compressed/ Encrypted Data File 2... Local File n Decryption File n Compressed/ Encrypted Data File n Central Directory File 1 Central Directory File 2... Central Directory File n Central End Figure 1: Conceptual View of the ZIP Format Seeing the value of a standardized mat file exchange, Katz made the ZIP technology available to others, publishing the mat via the APPNOTE 2. Consequently, the use of ZIP is ubiquitous and has become one of the most familiar technologies in use today. PKWARE continues to support and publish 1 National Institute of Science & Technology 4
5 the APPNOTE ZIP mat specification, collaborating with other vendors to promote and evolve the standard to meet evolving market needs. When Katz developed ZIP, he also established PKWARE to develop applications DOS and UNIX that used the specification. Shortly thereafter, PKWARE enhanced the ZIP mat in a number of ways, including expanding its metadata management capabilities better support of the data definition and space management controls required on those platms. In 2001, PKWARE began working with the ZIP community to expand the specification to include strong encryption data privacy, as well as digital signing and authentication data integrity validation. PKWARE developed products supporting these new structures under the brand SecureZIP, available the IBM mainframe operating system z/os, mid-range operating system i5/os, UNIX in the AIX, Solaris, and HP-UX varieties, Linux (kernel 2.4 and ward, certified the RedHat and SuSE distributions), and Microsoft Windows server and desktop. The updated operating system range is significant, representing all major enterprise computing platms. Both PKZIP and SecureZIP rigorously capture and store the significant metadata required to restore the data and its internal relationships. This facility is particularly useful the large platm use cases, as PKWARE products automatically allocate appropriate disk space, provide the relevant data control block (DCB) inmation (e.g., record mat [RECFM], logical record length [LRECL], block size [BLKSIZE]) needed to extract the data to large platm storage. Moreover, PKWARE ensures interoperability between all combinations of the supported operating systems, all relevant archiving, compression, encryption, and signing/authentication functions. For example, organizations can use SecureZIP on the mainframe data that will be distributed to and used on Windows clients. It automatically transms from EBCDIC to ASCII character encoding when going from large to small platm (and vice versa), and places or removes line feed & carriage return characters when the data moves between UNIX and Windows. Implementation of ZIP Encryption Recognizing the value that a multi-file archive has data protection, PKWARE developed SecureZIP, adding strong encryption support to the existing data compression and file management capabilities. SecureZIP complements the rigorous data-in-use physical and logical perimeter defenses that already exist in the enterprise. It also addresses data-at-rest and data-in-transit use cases with highly durable, yet still flexible data protection. SecureZIP applies data-centric encryption, protecting the data itself rather than protecting the transmission of the data (transport security) or access to the data through an application (access control), or the facilities that host the data (resource control). An organization s data loss risks are greatly reduced when SecureZIP is used to augment existing perimeter security and access control systems. Encryption has emerged as a central way to secure data and protect privacy, but not all encryption is the same. Organizations must make decisions about where and how to apply encryption in order to maximize the benefits their specific organization. The first choice is between using symmetric key encryption (i.e., passwords) or asymmetric encryption. Symmetric encryption relies solely on a single shared secret or key, typically a password. The symmetric approach tends to provide fast encryption, but sharing a single key is risky and secure key exchange is difficult. Unless such passwords are carefully managed, they can be compromised (e.g., an act as simple as finding the password hidden under a mouse pad). Likewise, unless passwords are very long and complex (theree difficult to remember and use), they can be subject to compromise from simple brute ce 2 For the technical specification document, please see links to subscribe to the service publishing notifications when changes to the mat are released, please see 5
6 attacks (automated repetitive attempts of all possible combinations) or dictionary attacks (similar to brute ce attacks, using word combinations). Asymmetric encryption uses a digital certificate with an associated key pair a public and a private key that have a unique relationship based on factoring the product of two large prime numbers. Data that is encrypted with one can only be decrypted using the other, and the complexity of the mathematical relationship is such that the eft required to reverse-engineer one from the other makes it effectively impossible. The asymmetric approach is considered more secure but is more computationally-intensive, which presents permance issues when processing large amounts of data. Both symmetric and asymmetric encryption approaches have drawbacks. Hybrid Cryptosystem The hybrid crypto solution offers a blend of the two different encryption approaches, gaining the best attributes of each without the disadvantages. A hybrid cryptosystem automatically generates a random and complex symmetric session key to encrypt the target data, creating an encrypted payload. Hybrid systems then use the asymmetric public key of the X.509 key pair to encrypt the symmetric key (see Figure 1). It applies the computationally-intensive asymmetric encryption to only the small symmetric key which is used to encrypt the larger source data payload. As a consequence, it consumes fewer resources while providing fast, effective encryption. SecureZIP is implemented as a hybrid cryptosystem. Cryptographic Calculation Sources The value of an encryption application like SecureZIP is directly related to the quality of the 6
7 cryptographic algorithms it uses. Since SecureZIP is used in a variety of circumstances, it supports a variety of cryptographic algorithm sources to complement those needs. While the application continues to support a number of weak encryption algorithms (i.e., the original PKWARE traditional 96-bit encryption, DES, and RC4), most contemporary uses of the product focus on either the strong encryption available with 3DES and, particularly, the AES algorithm at various bit strengths. Regardless of the supported operating system, SecureZIP offers a FIPS compliant Advanced Encryption Standard (AES) algorithm implementation. Consistent implementation of the AES algorithm across the several supported operating systems was initially implemented by integrating the RSA BSAFE cryptographic libraries, Crypto-C and Cert-C. PKWARE continues to reinvest in the SecureZIP product as market needs additional levels of data protection to meet internal and external obligations increase. For example, on most supported operating systems, SecureZIP goes further to support FIPS 140-validated encryption sources. FIPS- 140 is the best practice describing the security requirements cryptographic modules, detailing the standard of care with which the implementation of the AES algorithm and the handling of keys must be permed. While the FIPS 140-validated cryptographic libraries used vary by operating system 4, PKWARE invests the resources to ensure that interoperability across the many supported operating systems is maintained. Equally important, the product offers the ability to lock-down or default configuration so that the FIPS 140-mode must be used a distinct advantage compared to other offerings in this market. SecureZIP also leverages IBM s Integrated Cryptographic Services Facility (ICSF), on the z/os operating system, in part so customers can use the FIPS 140-validated hardware available on that platm. When encrypting on a mainframe equipped with a suitable add-on card cryptography (PCIXCC or CEX2C), SecureZIP can be configured to automatically use that FIPS 140-validated encryption source and only that encryption source. Alternatively, the product can be configured to use IBM s Central Processor Assist Cryptographic Function (CPACF) cryptographic calculation, and significantly reduce the amount of resources required to AES encrypt data. Digital Signing PKWARE s authentication implementation follows the traditional models digital signing, wherein the full body of data is first passed through a hash function to derive a fixed length output. The output is then encrypted using the signer s private key and this encrypted hash then becomes the digital signature. The digital signature and a copy of the signer certificate are attached to the data. Authentication is permed by using the signer s public key to decrypt the signed hash and then comparing that hash to an independently derived hash using the same input data and hash function. SecureZIP can attach one or many signatures to each file in a ZIP archive and one signature to the archive as a whole. It supports contemporary hash functions including MD5, SHA-1, and SHA-2 in a variety of bit strengths. While no longer considered sufficiently strong, MD5 remains available within SecureZIP to ensure compatibility with older archives and other ZIP-compatible applications. In Step with the Market s Data Protection Needs End-to-end encryption requires stringent attention to implementation and workflow issues. Many regulations, such as Payment Card Industry Data Security Standard (PCI DSS) call encryption as a means to protect sensitive data. However, as the Heartland Payment Systems data breach in illustrated, encryption needs to be applied to the data wherever it goes, however it get there, to ensure 3 Federal Inmation Processing Standards are models of best practice published by NIST. Federal guidelines require agencies to follow many of the FIPS practices, and many non-governmental organizations also subscribe to them as recognized best practices. 4 Please contact your PKWARE representative to obtain a copy PKWARE s letter of attestation describing the FIPS 140 implementations. 7
8 unanticipated exposure is not left unaddressed. Consequently, SecureZIP z/os and SecureZIP Server UNIX/Linux/Windows have been engineered to support genuinely seamless end-to-end encryption. Data can be protected immediately as it is extracted from a data source. Application Integration (see Figure 2) ensures that data is encrypted bee it is staged to disk, recordby-record (mainframe) or as a stream (server), anticipating the emerging best practices anticipated to be part of the Payment Card Industry (PCI) Data Security Standard (DSS) v1.3, expected to be announced in the latter part of End-to-end encryption data privacy is seen as a natural extension the need to protect data-in-motion and data-at-rest. By ensuring protection is applied the moment the target data shifts from being data-in-use to data-in-motion, an organization significantly reduces their attack surface and their associated risk. Gartner analyst, Avivah Litan, recently said, I think the payments industry needs to take some long-needed security steps including end-to-end encryption so that even if data is stolen, it s useless 6 Figure 2: SecureZIP Application Integration Conclusion PKWARE continues today to build upon the ZIP technology first introduced over 20 years ago. PKZIP technology was applied first to efficient data management by combining the multi-file, cross-operating system archive mat with data compression. Market needs have evolved and PKWARE continues to help its customers meet critical business requirements with SecureZIP, providing the same data compression and file management capabilities coupled with strong data protection and authentication. 5 Credit-Card security standard issued after much debate Computerworld IDG news online. The Payment Card Industry Security Standards Council issued revised security rules, while also indicating next year it will focus on new guidelines end-to-end encryption, payment machines and virtualization. 6 Downloaded March 9, 2009, from United States 648 N. Plankinton Ave. Suite220 Milwaukee, WI PKWARE UK/EMEA Crown House 72 Hammersmith Road London W14 8TH United Kingdom ph: +44 (0) PKWARE, Inc. All rights reserved. PKWARE, PKZIP, SecureZIP, and SecureZIP Mail Gateway are trademarks or registered trademarks in the U.S.A. and other countries. Any other trademarks are used identification purposes only and remain the property of their respective owners. 8
Secure your data. Wherever it is, Wherever it goes, However it gets there...on all major platforms. For every user.
Secure your data. Wherever it is, Wherever it goes, However it gets there......on all major platforms. For every user. SecureZIP Product Family SecureZIP products are designed as enterprise-class, data-centric
A guide for creating a more secure, efficient managed file transfer methodology
Sterling Connect:Direct & SecureZIP A guide for creating a more secure, efficient managed file transfer methodology JOE STURONAS CHIEF TECHNOLOGY OFFICER, PKWARE FORREST RATLIFF SOLUTIONS ENGINEER, PKWARE
Contingency Access to Enterprise Encrypted Data
T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents No option to escrow Passphrase protection zseries example Incorporating contingency key in zseries Windows command line example Incorporating
Spotlight on Mainframe Security: Privacy in the Data Center
Spotlight on Mainframe Security: Privacy in the Data Center P K W A R E W H I T E P A P E R WP 700.xxxx Table of Contents Introduction 3 From Terminal Server to Data Server 4 Data-centric Security 5 Considering
Spotlight on Mainframe Security: Data Authenticity and Endpoint Security
Spotlight on Mainframe Security: Data Authenticity and Endpoint Security P K W A R E W H I T E P A P E R WP 700.xxxx Table of Contents Cloud Computing and the Mainframe 3 Different Kinds of Clouds and
Protecting Data-at-Rest with SecureZIP for DLP
Protecting Data-at-Rest with SecureZIP for DLP TABLE OF CONTENTS INTRODUCTION 3 PROTECTING DATA WITH DLP 3 FINDING INDIVIDUAL AND SHARED INFORMATION-AT-REST 4 METHODS FOR REMEDIATION 4 ENCRYPTING UNPROTECTED
SecureZIP User Guide
SecureZIP User Guide SecureZIP is an application for zipping files to save storage space as well as encrypting files with password control to protect information. SecureZIP not only works alone to perform
Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance
Deploying PGP Encryption and Compression for z/os Batch Data Protection to (FIPS-140) Compliance Patrick Townsend Software Diversified Services/Townsend Security August 9, 2011 Session Number 9347 PGP
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
Alliance AES Encryption for IBM i Solution Brief
Encryption & Tokenization Alliance AES Encryption for IBM i Solution Brief A Complete AES Encryption Solution Alliance AES Encryption for IBM i provides AES encryption for sensitive data everywhere it
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows
Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows SecureZIP for Windows interoperates with leading PKI vendors including Entrust, VeriSign, and RSA to enable the
Tools for Managing Big Data Analytics on z/os
Tools for Managing Big Data Analytics on z/os Mike Stebner, Joe Sturonas PKWARE, Inc. Wednesday, March 12, 2014 Session ID 14948 Test link: www.share.org Introduction Heterogeneous Analysis Addressing
HOW ENCRYPTION WORKS. Introduction to BackupEDGE Data Encryption. Technology Overview. Strong Encryption BackupEDGE
HOW ENCRYPTION WORKS Technology Overview Strong Encryption BackupEDGE Introduction to BackupEDGE Data Encryption A major feature of BackupEDGE is the ability to protect archives containing critical client
PKWARE Inc. 648 N. Plankinton Ave. Suite # 220 Milwaukee, WI 53203 USA. www.pkware.com. Main Phone: 414.289.9788 Fax: 414.289.9789
2011FAAI T/ I SS PARTNERSHI PANDTRAI NI NGCONFERENCE S e c u r e Z I P f o r Wi n d o ws De s k t o pt r a i n i n gma n u a l T i p s f o r u s i n gs e c u r e Z I Pf o r Wi n d o ws De s k t o pv 1
Sharing Secrets Using Encryption Facility
Sharing Secrets Using Encryption Facility Eysha S. Powers IBM Corporation Insert Custom Session QR if Desired Tuesday, August 11, 2015: 6:00pm 7:00pm Session Number 17624 Cryptography is used in a variety
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
1 Step 1: Select... Files to Encrypt 2 Step 2: Confirm... Name of Archive 3 Step 3: Define... Pass Phrase
Contents I Table of Contents Foreword 0 Part I Introduction 2 1 What is?... 2 Part II Encrypting Files 1,2,3 2 1 Step 1: Select... Files to Encrypt 2 2 Step 2: Confirm... Name of Archive 3 3 Step 3: Define...
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Smartcrypt Encryption Key Management
Smartcrypt Encryption Key Management Executive Summary Encryption key management is the cornerstone of any enterprise encryption solution. The National Institute of Standards and Technology (NIST) has
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
IT Networks & Security CERT Luncheon Series: Cryptography
IT Networks & Security CERT Luncheon Series: Cryptography Presented by Addam Schroll, IT Security & Privacy Analyst 1 Outline History Terms & Definitions Symmetric and Asymmetric Algorithms Hashing PKI
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
tips A quick and easy guide to securing your private information www.pkware.com
tips A quick and easy guide to securing your private information tips A quick and easy guide to securing your private information Basic Information 1. How to install SecureZIP for Windows Desktop for individual
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About?
SUSE Linux Enterprise 12 Security Certifications Common Criteria, EAL, FIPS, PCI DSS,... What's All This About? Matthias G. Eckermann Senior Product Manager SUSE Linux Enterprise [email protected] Agenda Evaluation
PKZIP 6.0. Command Line for Windows Getting Started Manual
PKZIP 6.0 Command Line for Windows Getting Started Manual Copyright 2000-2002 PKWARE, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Data-centric Security: Encryption Essentials for Modern, Efficient Protection
Data-centric Security: Encryption Essentials for Modern, Efficient Protection JOE STURONAS CHIEF TECHNOLOGY OFFICER, PKWARE Contents Introduction...3 1. Data Protection...5 Encryption Basics...5 Data-centric
An Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
E2EE and PCI Compliancy. Martin Holloway VSP Sales Director VeriFone NEMEA
E2EE and PCI Compliancy Martin Holloway VSP Sales Director VeriFone NEMEA Security Breaches In The News 2 Security Breaches In The News 3 Security Breaches In The News 4 Security Breaches In The News 5
Password-based encryption in ZIP files
Password-based encryption in ZIP files Dmitri Gabbasov December 15, 2015 Abstract In this report we give an overview of the encryption schemes used in the ZIP file format. We first give an overview of
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Blaze Vault Online Backup. Whitepaper Data Security
Blaze Vault Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
A Standards-based Approach to IP Protection for HDLs
A Standards-based Approach to IP Protection for HDLs John Shields Staff Engineer, Modelsim Overview Introduction A Brief Status First Look at The Flow Encryption Technology Concepts Key Management Second
Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution
Securing Data Stored On Tape With Encryption: How To Choose the Right Encryption Key Management Solution NOTICE This Technology Brief may contain proprietary information protected by copyright. Information
PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support.
WebSphere DataPower Release 6.0.1 - FIPS 140-2 and NIST SP800-131a support. 601DataPower_Security_NIST.ppt Page 1 of 17 This presentation discusses three new security features in the WebSphere DataPower
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Transparent Data Encryption: New Technologies and Best Practices for Database Encryption
Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
White Paper. From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards
From Policy to Practice: A Practical Guide to Implementing HIPAA Security Safeguards Abstract HIPAA requires a number of administrative, technical, and physical safeguards to protect patient information
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
Odyssey Access Client FIPS Edition
Odyssey Access Client FIPS Edition Data Sheet Published Date July 2015 Product Overview The need today is greater than ever to ensure that systems are securely configured. Government agencies and secure
MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002
Security Policy MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS ENCRYPTION DLL CRYPTOGRAPHIC MODULE REV 1.3, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 2 Terms and Definitions...
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
Cryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
RSA BSAFE. Security tools for C/C++ developers. Solution Brief
RSA BSAFE Security tools for C/C++ developers Solution Brief Introduction Built on more than 20 years of expertise in delivering high-quality productsfor implementing strong security controls in software
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Configuring and Tuning SSH/SFTP on z/os
Configuring and Tuning SSH/SFTP on z/os Kirk Wolf / Steve Goetze Dovetailed Technologies [email protected] dovetail.com Monday, March 10, 2014, 1:30PM Session: 14787 www.share.org Session Info/Eval link
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO
PGP (Pretty Good Privacy) INTRODUCTION ZHONG ZHAO In The Next 15 Minutes, You May Know What is PGP? Why using PGP? What can it do? How did it evolve? How does it work? How to work it? What s its limitation?
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 11: Email security: PGP and S/MIME Ion Petre Department of IT, Åbo Akademi University February 14, 2012 1 Email
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
WiMAX Public Key Infrastructure (PKI) Users Overview
WiMAX Public Key Infrastructure (PKI) Users Overview WiMAX, Mobile WiMAX, Fixed WiMAX, WiMAX Forum, WiMAX Certified, WiMAX Forum Certified, the WiMAX Forum logo and the WiMAX Forum Certified logo are trademarks
IBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER U.S. Federal Information Processing Standard (FIPS) and Secure File Transfer www.ipswitchft.com FIPS 140-2 is a standard first published in 2001 by the U.S. National
CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
PROCEDURE FOR UPDATING LISTS THROUGH WEB INTERFACE
PROCEDURE FOR UPDATING LISTS THROUGH WEB INTERFACE Prerequisites In order to be able to follow the steps of the present procedure: the Operator (hereafter OP) must have presented the application to the
Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST
Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods
BBM Protected Secure mobile
BBM Protected Secure mobile messaging All the benefits of BBM with the security of enterprise-grade encryption BBM Protected allows employees to take advantage of the speed, reliability and privacy of
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
PGP - Pretty Good Privacy
I should be able to whisper something in your ear, even if your ear is 1000 miles away, and the government disagrees with that. -- Philip Zimmermann PGP - Pretty Good Privacy - services - message format
Enterprise effectiveness of digital certificates: Are they ready for prime-time?
Enterprise effectiveness of digital certificates: Are they ready for prime-time? by Jim Peterson As published in (IN)SECURE Magazine issue 22 (September 2009). www.insecuremag.com www.insecuremag.com 1
1.2 Using the GPG Gen key Command
Creating Your Personal Key Pair GPG uses public key cryptography for encrypting and signing messages. Public key cryptography involves your public key which is distributed to the public and is used to
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make
NETWORK SECURITY. Farooq Ashraf. Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia
NETWORK SECURITY Farooq Ashraf Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran 31261, Saudi Arabia O u t l i n e o f t h e P r e s e n t a t i o n What is Security
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
The governance IT needs Easy user adoption Trusted Managed File Transfer solutions
Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Securing Data at Rest ViSolve IT Security Team
Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1
Exam Papers Encryption Project PGP Universal Server Trial Progress Report
Exam Papers Encryption Project PGP Universal Server Trial Progress Report Introduction Using encryption for secure file storage and transfer presents a number of challenges. While the use of strong, well
Security Policy for Oracle Advanced Security Option Cryptographic Module
Security Policy for Oracle Advanced Security Option Cryptographic Module Version 1.0 September 1999 Prepared by Oracle Corporation A. Scope of Document This document describes the security policy for the
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
PGP from: Cryptography and Network Security
PGP from: Cryptography and Network Security Fifth Edition by William Stallings Lecture slides by Lawrie Brown (*) (*) adjusted by Fabrizio d'amore Electronic Mail Security Despite the refusal of VADM Poindexter
Cryptography and Security
Cunsheng DING Version 3 Lecture 17: Electronic Mail Security Outline of this Lecture 1. Email security issues. 2. Detailed introduction of PGP. Page 1 Version 3 About Electronic Mail 1. In virtually all
