Everyday Cryptography
|
|
|
- Noah Murphy
- 10 years ago
- Views:
Transcription
1 Everyday Cryptography Michael F. Herbst Interdisziplinäres Zentrum für wissenschaftliches Rechnen Ruprecht-Karls-Universität Heidelberg 24 November / 22
2 Table of Contents 1 Why cryptography? Why even bother? 2 Encrypted communication Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 1 / 22
3 Table of Contents 1 Why cryptography? Why even bother? 2 Encrypted communication Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 2 / 22
4 Why even bother? Why cryptography? Global total surveillance selector-based surveillance Responsibility for people around us as well Privacy and confidentiality Keeping (company) secrets Cryptonoise 3 / 22
5 Why even bother? Why use free software? Free Software 0 Use the software as you wish 1 Study the program in source and adapt it as you wish 2 Redistribute copies to help your neighbour 3 Distribute modified copies to help the whole community Free Software has higher potential to be secure All Software contains bugs Bugs can be fixed by everyone for everyone You or person you trust can review source Only free software is really trustworthy 4 / 22
6 Table of Contents 1 Why cryptography? Why even bother? 2 Encrypted communication Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 5 / 22
7 Unencrypted s 6 / 22
8 Unencrypted s 6 / 22
9 Unencrypted s #$!? #$!? 6 / 22
10 Unencrypted s #$!? #$!? 6 / 22
11 Unencrypted s #$!? #$!? 6 / 22
12 Demo DEMO 7 / 22
13 Using Transport Layer Security (TLS) #$!? #$!? 8 / 22
14 Using Transport Layer Security (TLS) #$!? #$!? 8 / 22
15 Using Transport Layer Security (TLS) #$!? #$!? 8 / 22
16 Using Transport Layer Security (TLS) #$!? #$!? 8 / 22
17 Using End2End encryption (e.g. Pretty Good Privacy) #$!? #$!? 9 / 22
18 Asymmetric encryption (here: PGP) A Bob s computer Alice s Public Key #$!? Eve and the internet A A A Alice s computer Alice s Private Alice s Key Private Key Alice s Public Key 10 / 22
19 Asymmetric encryption (here: PGP) A Bob s computer Alice s Public Key #$!? Eve and the internet A Alice s computer Alice s Private Key 10 / 22
20 Asymmetric encryption (here: PGP) A Bob s computer Alice s Public Key #$!? Eve and the internet A Alice s computer Alice s Private Key 10 / 22
21 Asymmetric encryption (here: PGP) A Bob s computer Alice s Public Key #$!? Eve and the internet A Alice s computer Alice s Private Key 10 / 22
22 What do you need? Programs Thunderbird and Enigmail (Windows, LinuX, OS X) GPGTools (OS X with Apple Mail) They all use: GnuPG Links / 22
23 Instant Messaging Instant Messaging: Typical setup Without any encryption 12 / 22
24 Instant Messaging Instant Messaging: Typical setup Without any encryption With TLS encryption 12 / 22
25 Instant Messaging Secure Instant Messaging Protocol Asymmetric encryption Off-the-record (OTR) messaging Works with many chat protocols and everyone who has plugin Perfect forward secrecy Can establish secret connection via passphrase and other channel Programs Multiprotocol: Facebook chat, Google Talk, SIP, XMPP (Jabber), IRC, MSN,... Adium (OS X) Pidgin (Windows, LinuX) Jitsi (Windows, LinuX, OS X) 13 / 22
26 Instant Messaging Secure Video Chats Jitsi ( not only good for chatting Open source Skype alternative Uses End2End encrypted video and audio Relatively new project (buggy, some pitfalls) Aims to be easy-to-use and secure-by-default 14 / 22
27
28 Table of Contents 1 Why cryptography? Why even bother? 2 Encrypted communication Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 15 / 22
29 Encrypting your files Hardware vs. software encryption Hardware encryption Crypto built-in to hard-drive / chip Software encryption Crypto realised by program running Both can be totally transparent to user Both can be attacked if physical access Attacking hardware encryption a little easier (warm-replug-attacks) Hardware-encryption less portable Software encryption almost always the better choice Warm-replug-attack events/5091.en.html 16 / 22
30 Encrypting your files Software encryption software LinuX dm-crypt and LUKS (package: cryptsetup) Transparent crypto layer Windows and OS X TrueCrypt 7.1a (not the 7.2 Version) Important: Use this link (VeraCrypt use with care) 17 / 22
31 Encrypting your files Software encryption software LinuX dm-crypt and LUKS (package: cryptsetup) Transparent crypto layer Windows and OS X TrueCrypt 7.1a (not the 7.2 Version) Important: Use this link (VeraCrypt use with care) 17 / 22
32 Table of Contents 1 Why cryptography? Why even bother? 2 Encrypted communication Instant Messaging 3 Hard disk encryption Encrypting your files 4 Summary 18 / 22
33 Summary By default everyday communication cannot be considered secure Crytpographic alternatives exist Setting up crypto initially is a barrier Once it runs properly: Almost no extra effort needed Regain privacy and trust 19 / 22
34 Why cryptography? Encrypted communication Hard disk encryption Summary Need any help? Go to a cryptoparty e.g. You can give me your and I ll let you know when the next one happens...duh! 20 / 22
35 Images From Asymmetric_cryptography_-_step_2.svg From the Tango Icon Theme The rest is my own work or derived of one of the above All released under CC by-sa / 22
36 Links This presentation will soon be on This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International Licence. 22 / 22
37
Signing and Encryption with GnuPG
Signing and Encryption with GnuPG Steve Revilak http://www.srevilak.net/wiki/talks Cryptoparty @ Somerville Public Library January 10, 2015 1 / 20 What is GnuPG? GnuPG is a free software implementation
Cryptography for Software and Web Developers
Cryptography for Software and Web Developers Part 5: Don t believe the crypto hype Hanno Böck 2014-05-28 1 / 10 The NSA scandal was the biggest boost for snake oil crypto of all time Threema, Telegram,
Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)
Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.
Encrypting your Email Communications using PGP
Encrypting your Email Communications using PGP If you are watching this tutorial as part of the conference materials, the software is on a separate CD. Alternately, you can obtain the software at the following
Internet Security. Contents. ITS335: IT Security. Internet Security. Secure Email. Summary
2 : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 2 January 2015 its335y14s2l10, Steve/Courses/2014/s2/its335/lectures/internet.tex, r3506
Encrypting Your Files. Because nobody else will And would you trust them if they did?
Encrypting Your Files Because nobody else will And would you trust them if they did? Why? Sensitive personal information NSA Identity thieves Linux Disk Encryption Dm-crypt is default under Linux Full
Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY BY FRAUKE OSTER
COVER STORY Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and Evolution LOCK AND KEY The leading email applications include new features for helping users secure and authenticate their
Signing and Encryption with GnuPG
Signing and Encryption with GnuPG Steve Revilak Cryptoparty @ Northeastern Law School Feb. 9, 2014 1 / 22 What is GnuPG? GnuPG is a free software implementation of the OpenPGP standard. PGP stands for
Alice and Bob are Really Confused
Alice and Bob are Really Confused David Huerta - DEF CON 23 Photo credit: Robert Young much codes such crypto parties very google trolling so cypherpunks wow nyc many credits: Atsuko Sato Alice wants to
HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am)
HW/Lab 1: Email Security with PGP, and Crypto CS 336/536: Computer Network Security DUE 09/28/2015 (11am) This HW/Lab assignment covers Lectures 2 to 4. Please review these thoroughly before starting to
Encrypted File Systems. Don Porter CSE 506
Encrypted File Systems Don Porter CSE 506 Goals Protect confidentiality of data at rest (i.e., on disk) Even if the media is lost or stolen Protecting confidentiality of in-memory data much harder Continue
File and email encryption with GPG4win & Enigmail
Protektor Services Windows Manual 11.5 File and email encryption with GPG4win & Enigmail Introduction, Contact, Legals, License Introduction Protektor Services Manual version 11.5 A new edition of the
An Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst
An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst Topics Secure Email Basics Types of Secure Email Walkthroughs 2 Secure Email Services Confidentiality Message Integrity
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
White paper. Why Encrypt? Securing email without compromising communications
White paper Why Encrypt? Securing email without compromising communications Why Encrypt? There s an old saying that a ship is safe in the harbour, but that s not what ships are for. The same can be said
Disk encryption... (not only) in Linux. Milan Brož [email protected]
Disk encryption... (not only) in Linux Milan Brož [email protected] FDE - Full Disk Encryption FDE (Full Disk Encryption) whole disk FVE (Full Volume Encryption) just some volumes (dis)advantages? + for
GPG - GNU Privacy Guard
GPG - GNU Privacy Guard How to use Károly Erdei October 15, 2014 Károly Erdei GPG - GNU Privacy Guard 1/60 1 Why 2 Cryptography 3 PGP 4 KGPG-Assistant 5 -Key-Manager 6 -Editor 7 GPG4Win 8 Enigmail Károly
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Debian s role in establishing an alternative to Skype
Debian s role in establishing an alternative to Skype Motivation, Challenges and Tactics http://www.opentelecoms.org mini-debconf, Paris, November 2012 Introduction Motivation why do we need to do something?
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
Securing Data at Rest ViSolve IT Security Team
Securing Data at Rest ViSolve IT Security Team 1 Table of Contents 1 Introduction... 3 2 Why Data at Rest needs to be secure?... 4 3 Securing Data... 4 3.1 Encryption - Access Control Approach... 5 3.1.1
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES
INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES AN AMP-3 PREPAREDNESS PRIMER Resources Compiled and Printed by Amp-3, LLC V2.0 rev April 2014 ! INTERNET EMAIL DOCUMENT SECURITY & PRIVACY RESOURCES
Jive Connects for Openfire
Jive Connects for Openfire Contents Jive Connects for Openfire...2 System Requirements... 2 Setting Up Openfire Integration... 2 Configuring Openfire Integration...2 Viewing the Openfire Admin Console...3
Internet Programming. Security
Internet Programming Security Introduction Security Issues in Internet Applications A distributed application can run inside a LAN Only a few users have access to the application Network infrastructures
For Paranoid People. by _NSAKEY
XMPP For Paranoid People by _NSAKEY Obligatory self-promotion hashcat beta tester Tor relay and bridge operator ANSI art enthusiast "not affiliated with the USA'S NSA" - HardenedBSD.org Donor's page "I
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH [email protected] Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key
Friends and Enemies Security Outline Encryption lgorithms Protocols Message Integrity Protocols Key Distribution Firewalls Figure 7.1 goes here ob, lice want to communicate securely Trudy, the intruder
Single Sign-On Framework in Tizen Contributors: Alexander Kanavin, Jussi Laako, Jaska Uimonen
Single Sign-On Framework in Tizen Contributors: Alexander Kanavin, Jussi Laako, Jaska Uimonen Introduction Architecture Demonstration 2 What is the problem that Single Sign-on systems are aiming to solve?
Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow
Michael Seltzer COMP 116: Security Final Paper Client Side Encryption in the Web Browser Mentor: Ming Chow 1 Abstract Web service providers generally look to encryption as a means of ensuring data privacy
CS 3251: Computer Networking 1 Security Protocols I
Georgia Tech CS 3251: Computer Networking 1 Security Protocols I Brad Reaves, PhD Student 11/21/13 (slides from Prof. Patrick Traynor) CS 3251 - Computer Networks I Last Time Trying to prove who you are
Email Security. Michael E. Locasto University of Calgary
Email Security Michael E. Locasto University of Calgary Agenda Read Chapter 20 and 21 - don t need to memorize PEM details background: RFCs, Chapter 22 Concept queskon: Where do we put security? SMTP Refresher
SecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Securing your Linksys Wireless Router BEFW11S4 Abstract
Securing your Linksys Wireless Router BEFW11S4 Abstract Current implementations of the 802.11b wireless LAN standards have several potential pitfalls for security. However, built in security mechanisms
Security: Focus of Control. Authentication
Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized
Analyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Using Your PGP Tool to Update Your Email Address Settings for Encrypted Messaging Overview The University of Pittsburgh is removing the
Better Safe Than Sorry
Better Safe Than Sorry Security and OS X [email protected] SECURITY An Unexpectedly long Journey Agenda Threats Protection Configurations Best Practices? Let s talk security Distrust and causion are
SafeCall Secure Communication System
SafeCall Secure Communication System Specifically Engineered for our Panama Clientele Trevor Grose [Panama Manager] Jim Sanders [Europe] Business Development Manager Managing Director Email: [email protected]
Secure Email User Guide
Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...
How To Secure Your Email From Being Hacked On A Pc Or Mac Or Ipad (For Free) For A Long Time (For A Long Period Of Time) For Free (For Commercial) For Your Money (For Business) For The Long Term
CYBER-ATLAS TOOLKIT TOOLKIT: REFERENCES FREE EMAIL ENCRYPTION SOFTWARE BEFORE YOU START Limited functionality, limited capacity, limited usage, limited platforms or restrictions disallowing commercial
Lecture 6 - Cryptography
Lecture 6 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07 Question 2 Setup: Assume you and I don t know anything about
Maxis BizVoice For iphone User Guide. Version 1.0
Maxis BizVoice For iphone User Guide Version 1.0 Maxis BizVoice for iphone iphone With Maxis BizVoice for iphone you can be reached via both your mobile number and fixed line extension! Calls to your fixed
Pretty Good Privacy with GnuPG
Pretty Good Privacy with GnuPG Steve Revilak Cabot House Sep. 24, 2013 1 / 16 Encryption and Signing Encryption The purpose is to ensure that a message is readable only by someone possessing a specific
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Mcabber User Guide. franky
Mcabber User Guide franky October 11, 2008 Contents 1 Basic Usage 3 1.1 Multi-user Chat.......................... 4 1.2 Transports............................. 5 1.3 Symbols..............................
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
CS 4803 Computer and Network Security
Network layers CS 4803 Computer and Network Security Application Transport Network Lower level Alexandra (Sasha) Boldyreva IPsec 1 2 Roughly Application layer: the communicating processes themselves and
GPG4win / Kleopatra Documentation. Secure file and e-mail encryption by using GnuPG for Windows
GPG4win / Kleopatra Documentation Secure file and e-mail encryption by using GnuPG for Windows GPG4win Detailed How To: Installing Gpg4win: 1. Go to the following website http://www.gpg4win.org/download.html,
Encrypting a USB Drive Using TrueCrypt
Encrypting a USB Drive Using TrueCrypt This document details the steps to encrypt a USB Pen drive using TrueCrypt. TrueCrypt is free and open-source security software allowing encryption of documents and
How to Create and Maintain an Anonymous Identity Online
How to Create and Maintain an Anonymous Identity Online By Anonymous33 Email: [email protected] Revision 1 Date: 23/03/2011 WARNING: The information contained in this guide is for educational and protection
The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen.
openpgp email security for mozilla applications The Handbook V 1.8 Adaptations by Ludwig Hügelschäfer Based on Version 1 by Daniele Raffo with Patrick Brunschwig and Robert J. Hansen. Enigmail Handbook
PRODUCT COMPARISON CHART COMPARE THE COMPLETE ZOIPER PRODUCT LINE
PRODUCT COMPARISON CHART COMPARE THE COMPLETE ZOIPER PRODUCT LINE How to read the Zoiper Product Comparison Chart Windows Add-on OEM On demand Coming soon Available feature Feature is available free of
Secure Mail Message Retrieval Instructions
2015 Secure Mail Message Retrieval Instructions IT Security University Medical Center 1/26/2015 Table of Contents INTRODUCTION... 3 REGISTRATION MESSAGES... 3 RETRIEVING THE SECURE EMAIL... 4 SECURE MESSAGE...
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
PGP(R) Desktop Version 10.0 for Mac OS X Release Notes
Page 1 of 6 PGP(R) Desktop Version 10.0 for Mac OS X Release Notes Thank you for using this PGP Corporation product. These Release Notes contain important information regarding this release of PGP Desktop
Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras
Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf
PGP Desktop Email Quick Start Guide Version 10.2
PGP Desktop Email Quick Start Guide Version 10.2 What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. Use PGP Desktop Email to: Automatically and transparently encrypt,
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Retrieving Internet chat history with the same ease as a squirrel cracks nuts
Retrieving Internet chat history with the same ease as a squirrel Yuri Gubanov CEO, Belkasoft http://belkasoft.com SANS Forensic Summit September 21, 2011 London, Great Britain What is Instant Messenger!
Remaining Anonymous. Osman Surkatty surkatty.org / @surkatty
Remaining Anonymous Osman Surkatty surkatty.org / @surkatty Full Disclosure I m a person, not representing a company. Information here is for educational purposes. What you do with it, is your problem.
PENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.
Social Sciences Computing a division of File Security John Marcotte Director of February 2008 File Security Review security issues Overview of encryption Software Data Security Plan Questions Reasons for
Biography of Trainer. Education. Experience. Summary. TLS/SSL : Securing your website PGP : Secure your email communication. Topic
Topic Name of the Trainer/Speaker Professional Position and Name of Organization Email TLS/SSL : Securing your website PGP : Secure your email communication Mohammad Fakrul Alam CTO bdhub Limited [email protected]
Secure Storage. Lost Laptops
Secure Storage 1 Lost Laptops Lost and stolen laptops are a common occurrence Estimated occurrences in US airports every week: 12,000 Average cost of a lost laptop for a corporation is $50K Costs include
Key Management (Distribution and Certification) (1)
Key Management (Distribution and Certification) (1) Remaining problem of the public key approach: How to ensure that the public key received is really the one of the sender? Illustration of the problem
Crypho Security Whitepaper
Crypho Security Whitepaper Crypho AS Crypho is an end-to-end encrypted enterprise messenger and file-sharing application. It achieves strong privacy and security using well-known, battle-tested encryption
How to use PGP Encryption with iscribe
How to use PGP Encryption with iscribe iscribe e-mail seamlessly supports e-mail encryption and digital signatures. This bulletin describes how to setup iscribe so that you can send and receive encrypted
GPG installation and configuration
Contents Introduction... 3 Windows... 5 Install GPG4WIN... 5 Configure the certificate manager... 7 Configure GPG... 7 Create your own set of keys... 9 Upload your public key to the keyserver... 11 Importing
Chapter 32 Internet Security
Chapter 32 Internet Security Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 32: Outline 32.1 NETWORK-LAYER SECURITY 32.2 TRANSPORT-LAYER SECURITY 32.3
Site Administrator User Guide. show, tell, share
Site Administrator User Guide show, tell, share Contents About your Team site 1 What is a Team site? 1 What can you do on a Team or Business site that you can t do on www.present.me? 1 Getting Started
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
THUNDERBIRD WORKBOOK
THUNDERBIRD WORKBOOK 1 2 Published : 2012-05-25 License : None INTRODUCTION 1. ABOUT THIS WORKBOOK 2. INTRODUCTION TO THUNDERBIRD 3 1. ABOUT THIS WORKBOOK T his workbook is designed to complete specific
The Public Key Muddle
The Public Key Muddle How to manage transparent end-to-end encryption in organizations Dr. Gunnar Jacobson CEO Secardeo GmbH Business Communication E-Mail Desktop (e.g. Outlook) Cloud (e.g. Office 365)
Cloud Computing for Education Workshop
Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT Why Should You Learn This? Learn some useful software and services Backup and sync your materials for teaching Data reliability
PGP Desktop Email Quick Start Guide version 9.6
What is PGP Desktop Email? PGP Desktop Email is part of the PGP Desktop family of products. You can use PGP Desktop Email to: Automatically and transparently encrypt, sign, decrypt, and verify email messages
Secure email in times of rising mobile communication
White paper Secure email in times of rising mobile communication Applied cryptography: Certificates, Gateways and End-to-End Encryption White paper Secure email in times of rising mobile communication
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
