SiRiUS: Securing Remote Untrusted Storage
|
|
|
- Collin Mitchell
- 10 years ago
- Views:
Transcription
1 SiRiUS: Securing Remote Untrusted Storage NDSS 2003 Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, and Dan Boneh Stanford University
2 Introduction Secure network file systems not widespread. Why? 1. Hard to deploy No backwards compatibility 2. File sharing not well supported No file sharing ability, or Fully trusted server handles file sharing
3 Insecure Network File Systems Legacy network file systems widely used: NFS, CIFS, Yahoo! insecure: NFS v2 Weak authentication: UID/GID Fully trusted server
4 SiRiUS Goals 1. No changes to remote file server Implies crypto techniques 2. Easy for end users to deploy Minimal client software, no kernel changes 3. File Sharing with fine grained access control Read-write separation 4. Minimize trust in file server
5 Existing Secure File Systems 1. CFS Blaze Single user: no file sharing 2. SFS Mazières et al. File sharing but uses trusted server 3. SUNDR Mazières et al. File sharing by untrusted server Not easy to deploy: requires block servers
6 Although NFS version 2 has been superseded in recent years by NFS version 3, system administrators are slow to upgrade so NFS version 2 is not only widespread, it is still by far the most popular version of NFS. NFS v3 Designers 4½ years after NFS v3 introduced
7 Design Limitations Cannot defend against DOS attacks: attacker breaking into file server can delete all files Solution: 1. Keep good backups: SiRiUS easy to backup 2. Replicate files using quorum systems - e.g. Reiter-Mahlki (1997)
8 SiRiUS Usage Model SiRiUS is a file system layered over existing network file systems Stop-gap measure until full upgrade of legacy systems
9 Security Design 1. Confidentiality and integrity 2. Cryptographic file level read-write access controls 3. Simple key management 4. Simple access control revocation 5. Freshness guarantees for access control meta data
10 Architecture SiRiUS Client Application NFS Client NFS Server NFS Server Network User Kernel File Server NFS Client Client Machine SiRiUS layered over NFS
11 Architecture SiRiUS Client Application CIFS Client CIFS Server NFS Server Network User Kernel File Server NFS Client Client Machine SiRiUS layered over CIFS
12 Architecture SiRiUS Client Application Yahoo! Client Yahoo! Server NFS Server Network User Kernel File Server NFS Client Client Machine SiRiUS layered over Yahoo!
13 File Data Security Each file has unique: 1.File Encryption Key (FEK) 2.File Signing Key (FSK) FEK, FSK control file read-write access Users keep only 2 keys for all files: 1.Master Signing Key (MSK) 2.Master Encryption Key (MEK) MSK, MEK control all file FEK and FSK access
14 File Structures Files on remote server split in 2 parts 1. md-file contains the file meta data. e.g. access control information 2. d-file contains the file data
15 File Structures ENC FEK [File Data] SIG FSK [File Data Hash] d-file Enc. Key Block (Owner) Enc. Key Block (User 1) File Sig. Pub. Key (FSK) Time Stamp File name SIG MSK [Meta Data Hash] md-file
16 Encrypted Key Blocks Username (KeyID) File Enc. Key (FEK) File Sig. Private Key (FSK) Read-write Encrypted with username s MEK public key Username (KeyID) File Enc. Key (FEK) Read only
17 Meta Data File Creation
18 Meta Data File Creation 1) Generate file keys (FSK and FEK) File Enc. Key (FEK) File Sig. Private Key (FSK)
19 Meta Data File Creation Username (KeyID) File Enc. Key (FEK) File Sig. Private Key (FSK) 1) Generate file keys (FSK and FEK) 2) Create encrypted key block. Encrypted with owner s MEK public key
20 Meta Data File Creation Enc. Key Block (Owner) File Sig. Pub. Key (FSK) Time Stamp File name 3) Append Pub FSK, time stamp, and file name to enc. key block
21 Meta Data File Creation Enc. Key Block (Owner) File Sig. Pub. Key (FSK) Time Stamp File name SIG MSK [Meta Data Hash] 3) Append Pub FSK, time stamp, and file name to enc. key block 4) Hash and sign using owner s master signing key
22 Meta Data File Creation Enc. Key Block (Owner) File Sig. Pub. Key (FSK) Time Stamp File name SIG MSK [Meta Data Hash] 3) Append Pub FSK, time stamp, and file name to enc. key block 4) Hash and sign using owner s master signing key 5) Update md-file freshness tree
23 Why are freshness guarantees needed? Can verify latest version of info is read md-file freshness prevents rollback of revoked privileges
24 Rollback Revoked Privileges 1. Bob revokes write access from Alice 2. Alice replaces new md-file with saved (older) copy 3. Replacement restores write privileges 4. Alice can undetectably write to d-file
25 Freshness Overview SiRiUS client generates hash tree of all md-files owned by user Hash tree root: hash of all the md-files Every directory has mdf-file made of the hash of: 1. md-files in that directory 2. mdf-files of sub directories
26 Hash Tree Generation / /a foo /a/b bar Key: dir file bin con
27 Hash Tree Generation Want to generate root mdf / root mdf /a foo /a/b bar Key: dir file bin con
28 Hash Tree Generation Want to generate root mdf / root mdf Before root mdf can be generated, we need /a/mdf /a mdf foo Key: /a/b bar dir file bin con
29 Hash Tree Generation Want to generate root mdf / root mdf Before root mdf can be generated, we need /a/mdf /a mdf foo Key: which in turn needs /a/b/mdf /a/b mdf bar dir file bin con
30 Hash Tree Generation / /a foo Key: Hash bin and con to generate /a/b/mdf /a/b mdf bar dir file bin con
31 Hash Tree Generation / Hash /a/b/mdf and bar to generate /a/mdf /a mdf foo Key: /a/b bar dir /a/b/mdf mdf file bin con
32 Hash Tree Generation Hash /a/mdf and foo to generate root mdf / root mdf /a foo /a/mdf /a/b/mdf /a/b mdf mdf bar Key: dir file bin con
33 Root mdf-file Contains a time stamp Time stamp updated by client at specified time intervals Signed by owner of the md-files
34 Hash Tree Generation 1. Generated only once 2. Generated by owner of md-files 3. Hash tree cacheable 4. Updated only on md-file changes
35 Verify md-file Freshness / root mdf /a foo /a/mdf mdf /a/b bar Key: /a/b/mdf mdf dir bin con file
36 Verify md-file Freshness / root mdf /a foo /a/mdf mdf /a/b bar Key: /a/b/mdf bin mdf con Verify bar md-file freshness dir file
37 Verify md-file Freshness / 1) Hash /a/b/mdf and bar to regenerate /a/mdf /a mdf root mdf foo /a/b bar Key: /a/b/mdf bin mdf con Verify bar md-file freshness dir file
38 Verify md-file Freshness / 1) Hash /a/b/mdf and bar to regenerate /a/mdf root mdf /a mdf foo 2) Compare regenerated /a/mdf to current version /a/b bar Key: /a/b/mdf bin mdf con Verify bar md-file freshness dir file
39 Verify md-file Freshness 1) Hash /a/mdf and foo to regenerate root mdf / root mdf /a foo /a/mdf mdf /a/b bar Key: /a/b/mdf bin mdf con Verify bar md-file freshness dir file
40 Verify md-file Freshness 1) Hash /a/mdf and foo to regenerate root mdf / root mdf 2) Compare regenerated root mdf to current version /a foo /a/mdf mdf /a/b bar Key: /a/b/mdf bin mdf con Verify bar md-file freshness dir file
41 Verify md-file Freshness 1) Hash /a/mdf and foo to regenerate root mdf / root mdf 2) Compare regenerated root mdf to current version /a/mdf /a mdf foo 3) Check timestamp verify owner s sig /a/b bar Key: /a/b/mdf bin mdf con Verify bar md-file freshness dir file
42 File System Operations 1. Create, read, write, rename, unlink, share files 2. Symbolic links but no hard links 3. User access revocation
43 User 1 Access Revocation Enc. Key Block (Owner) Enc. Key Block (User 1) File Sig. Pub. Key (FSK) Time Stamp File name SIG MSK [Meta Data Hash]
44 User 1 Access Revocation Enc. Key Block (Owner) Enc. Key Block (User 1) File Sig. Pub. Key (FSK) Time Stamp File name SIG MSK [Meta Data Hash] 1) Regenerate new file keys
45 User 1 Access Revocation Enc. Key Block (Owner) Enc. Key Block (User 1) File Sig. Pub. Key (FSK) Time Stamp File name SIG MSK [Meta Data Hash] 1) Regenerate new file keys 2) Remove user 1 key block
46 User 1 Access Revocation Enc. Key Block (Owner) File Sig. Pub. Key (FSK) Time Stamp File name SIG MSK [Meta Data Hash] 3) Update file sig. key and enc. key blocks 1) Regenerate new file keys 2) Remove user 1 key block
47 User 1 Access Revocation Enc. Key Block (Owner) File Sig. Pub. Key (FSK) Time Stamp File name SIG MSK [Meta Data Hash] 3) Update file sig. key and enc. key blocks 4) Update time stamp 1) Regenerate new file keys 2) Remove user 1 key block
48 User 1 Access Revocation Enc. Key Block (Owner) File Sig. Pub. Key (FSK) Time Stamp File name SIG MSK [Meta Data Hash] 3) Update file sig. key and enc. key blocks 4) Update time stamp 5) Update hash and sig 1) Regenerate new file keys 2) Remove user 1 key block
49 User 1 Access Revocation Enc. Key Block (Owner) File Sig. Pub. Key (FSK) Time Stamp File name SIG MSK [Meta Data Hash] 3) Update file sig. key and enc. key blocks 4) Update time stamp 5) Update hash and sig 1) Regenerate new file keys 2) Remove user 1 key block 6) Update freshness hash tree
50 User 1 Access Revocation Enc. Key Block (Owner) File Sig. Pub. Key (FSK) Time Stamp File name SIG MSK [Meta Data Hash] 3) Update file sig. key and enc. key blocks 4) Update time stamp 5) Update hash and sig 1) Regenerate new file keys 2) Remove user 1 key block 6) Update freshness hash tree 7) reencrypt file data
51 Architecture SiRiUS Client Application NFS Client NFS Server NFS Server Network User Kernel File Server NFS Client Client Machine SiRiUS layered over NFS using SFS toolkit
52 Implementation Details Multiplex incoming NFS requests into multiple outgoing NFS requests NFS file handle cache Changing file access controls Random access Essential for good performance in partial file reads/writes
53 Random Access Existing crypto file systems that support random access either 1. use block storage servers (SUNDR) 2. don t encrypt data on server (SFS) Method: 1. View file as a series of blocks 2. Hash tree for file integrity Similar construction used for authenticating digital streams Wong and Lam (1998).
54 Performance 1. Public key encryption - RSA Signatures - DSA Data file encryption - AES Linux 2.4 NFS server GHz P3 NFS client MHz P3-M 100 Mbps link
55 Performance Test File Size Kernel NFS DumbFS SiRiUS Create File Delete File Seq. Read 8 KB Seq. Write 8 KB Seq. Read 1 MB Seq. Write 1 MB Times are in milliseconds.
56 Other Extensions Encrypted path names Large scale group sharing using NNL broadcast encryption Maintaining traditional file system semantics using union mounts Union mounts also solve d-file rollback
Plutus: scalable secure file sharing on untrusted storage
Plutus: scalable secure file sharing on untrusted storage Mahesh Kallahalla HP Labs Joint work with Erik Riedel (Seagate Research), Ram Swaminathan (HP Labs), Qian Wang (Penn State), Kevin Fu (MIT) March
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Security in Storage Networks A Current Perspective
Security in Storage Networks A Current Perspective Christian Cachin ZISC Colloquium www.zurich.ibm.com Overview Networked storage systems NAS, SAN, OBS Design options for security
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
DarkFS - An Encrypted File System
1 DarkFS - An Encrypted File System Team: Arjun Narayanan, Yuta 1. Motivation In many software applications, we want to store files in a remote, untrusted file server. With an untrusted file server, we
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Wireless Network Security 14-814 Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
SSL Protect your users, start with yourself
SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Authentication Applications
Authentication Applications CSCI 454/554 Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures Kerberos a symmetric-key
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Encrypt-FS: A Versatile Cryptographic File System for Linux
Encrypt-FS: A Versatile Cryptographic File System for Linux Abstract Recently, personal sensitive information faces the possibility of unauthorized access or loss of storage devices. Cryptographic technique
Authenticity of Public Keys
SSL/TLS EJ Jung 10/18/10 Authenticity of Public Keys Bob s key? private key Bob public key Problem: How does know that the public key she received is really Bob s public key? Distribution of Public Keys!
We mean.network File System
We mean.network File System Introduction: Remote File-systems When networking became widely available users wanting to share files had to log in across the net to a central machine This central machine
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
PowerChute TM Network Shutdown Security Features & Deployment
PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
How To Restore An Org Server With Anor Backup For Windows 7.5.2 (Oracle)
Oracle Server Backup User Guide TABLE OF CONTENTS Introduction... 2 Oracle Server Backup... 3 Features... 3 Requirements for Oracle server backup... 3 How to enable ARCHIVELOG Mode... 3 System Requirements...
Multi-site Best Practices
DS SOLIDWORKS CORPORATION Multi-site Best Practices SolidWorks Enterprise PDM multi-site implementation [SolidWorks Enterprise PDM 2010] [] [Revision 2] Page 1 Index Contents Multi-site pre-requisites...
AxCrypt File Encryption Software for Windows. Quick Installation and Users Guide. Version 1.7 or later. July 2012
AxCrypt File Encryption Software for Windows Quick Installation and Users Guide Version 1.7 or later July 2012 Copyright 2005-2012 Svante Seleborg, Axantum Software AB 2(18) This guide describes how to
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
COS 318: Operating Systems. File Layout and Directories. Topics. File System Components. Steps to Open A File
Topics COS 318: Operating Systems File Layout and Directories File system structure Disk allocation and i-nodes Directory and link implementations Physical layout for performance 2 File System Components
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
JBackpack Manual. Version 0.9.3. Abstract
JBackpack Manual JBackpack Manual Version 0.9.3 Abstract JBackpack is a personal backup program. It features incremental backups, network transparency and encryption. Table of Contents 1. Overview... 1
Distributed File Systems Part I. Issues in Centralized File Systems
Distributed File Systems Part I Daniel A. Menascé File Naming Issues in Centralized File Systems c:\courses\cs571\procs.ps (MS-DOS) /usr/menasce/courses/cs571/processes.ps (UNIX) File Structure bitstream
File Systems Security Encryption File Systems
ISE331: Fundamentals of Computer Security Spring 2015 Radu Sion File Systems Security Encryption File Systems 2005-15 Thanks to G. Suryanarayana and K. Thangavelu Fair-use educational use of several online
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
WHITE PAPER www.tresorit.com
WHITE PAPER tresor [tʀeˈzoːɐ ] noun (German) 1. lockable, armoured cabinet THE CLOUD IS UNTRUSTED The cloud has huge potential when it comes to storing, sharing and exchanging files, but the security provided
BSc (Hons) Sofware Engineering. Examinations for 2010-2011 / Semester 2
BSc (Hons) Sofware Engineering Cohort: BSE/09/FT & BSE/07/PT Examinations for 2010-2011 / Semester 2 MODULE: Security Concepts MODULE CODE: SECU2101 Duration: 2 Hours Instructions to Candidates: 1. ALL
Plutus: Scalable secure file sharing on untrusted storage
Plutus: Scalable secure file sharing on untrusted storage Mahesh Kallahalla Erik Riedel Ram Swaminathan Qian Wang Kevin Fu Hewlett Packard Labs Palo Alto, CA 94304 Abstract Plutus is a cryptographic storage
Guidelines on use of encryption to protect person identifiable and sensitive information
Guidelines on use of encryption to protect person identifiable and sensitive information 1. Introduction David Nicholson, NHS Chief Executive, has directed that there should be no transfers of unencrypted
Distributed File Systems
Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.
Ryusuke KONISHI NTT Cyberspace Laboratories NTT Corporation
Ryusuke KONISHI NTT Cyberspace Laboratories NTT Corporation NILFS Introduction FileSystem Design Development Status Wished features & Challenges Copyright (C) 2009 NTT Corporation 2 NILFS is the Linux
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Network File System (NFS)
Network File System (NFS) Brad Karp UCL Computer Science CS GZ03 / M030 10 th October 2011 NFS Is Relevant Original paper from 1985 Very successful, still widely used today Early result; much subsequent
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
EMC Data Protection Search
EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes
Distributed File Systems
Distributed File Systems Mauro Fruet University of Trento - Italy 2011/12/19 Mauro Fruet (UniTN) Distributed File Systems 2011/12/19 1 / 39 Outline 1 Distributed File Systems 2 The Google File System (GFS)
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
AxCrypt File Encryption Software for Windows. Quick Installation Guide. Version 1.6.3. January 2008
AxCrypt File Encryption Software for Windows Quick Installation Guide Version 1.6.3 January 2008 Copyright 2005-2008 Svante Seleborg, Axantum Software AB 2(19) This guide describes how to install and quickly
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
SQL Server Encryption Overview. September 2, 2015
SQL Server Encryption Overview September 2, 2015 ABOUT ME Edmund Poillion Data Platform Systems Engineer Skyline Associate since 1999 Started in App Dev, changed focus to SQL Server in 2012 Email: [email protected]
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Security Overview for Windows Vista. Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation
Security Overview for Windows Vista Bob McCoy, MCSE, CISSP/ISSAP Technical Account Manager Microsoft Corporation Agenda User and group changes Encryption changes Audit changes User rights New and modified
Managing and Maintaining Windows Server 2008 Servers
Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
File System Encryption with Integrated User Management
File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich [email protected] Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of
Note: There is no downgrade path from GMM v8.3 (SQL version) to v8.0.
Good Mobile Messaging Server Version 8.3.1 (SQL Version) Good Mobile Control Server 2.6.3 for Microsoft Windows Exchange Upgrading Good Mobile Control and Good Messaging from BDB Version Updated: 07/29/15
Linux Network Administration
Linux Network Administration Sendmail Evolution of Email The birth of electronic mail (email) occurred in the early 1960s The mailbox was a file in a user's home directory that was readable only by that
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
Administration Guide. Wireless software upgrades
Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources
Chapter 11 Distributed File Systems. Distributed File Systems
Chapter 11 Distributed File Systems Introduction Case studies NFS Coda 1 Distributed File Systems A distributed file system enables clients to access files stored on one or more remote file servers A file
GoAnywhere Director to GoAnywhere MFT Upgrade Guide. Version: 5.0.1 Publication Date: 07/09/2015
GoAnywhere Director to GoAnywhere MFT Upgrade Guide Version: 5.0.1 Publication Date: 07/09/2015 Copyright 2015 Linoma Software. All rights reserved. Information in this document is subject to change without
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0
Technical Note Replacing vcenter Server 4.0 Certificates VMware vsphere 4.0 Certificates are automatically generated when you install vcenter Server and ESX/ESXi. These default certificates are not signed
CHAPTER 17: File Management
CHAPTER 17: File Management The Architecture of Computer Hardware, Systems Software & Networking: An Information Technology Approach 4th Edition, Irv Englander John Wiley and Sons 2010 PowerPoint slides
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Quick Start - NetApp File Archiver
Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS GETTING STARTED Upgrade Configuration Archive Recover Page 1 of 14 Overview - NetApp File Archiver Agent TABLE OF CONTENTS
Storgrid EFS Access all of your business information securely from any device
Datasheet Storgrid EFS Access all of your business information securely from any device September 2014 2014 STORGRID International Holding BV. This document is created with the utmost care. To prevent
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Network Security. Mobin Javed. October 5, 2011
Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
Ciphermail for BlackBerry Reference Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail for BlackBerry Reference Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 3 2 BlackBerry add-on 3 2.1
BroadSAFE Enhanced IP Phone Networks
White Paper BroadSAFE Enhanced IP Phone Networks Secure VoIP Using the Broadcom BCM11xx IP Phone Technology September 2005 Executive Summary Voice over Internet Protocol (VoIP) enables telephone calls
CS 416: Opera-ng Systems Design
Question 1 Explain the major difference between a file system that supports journaling (e.g., Linux ext4) versus a log-structured file system (e.g., YAFFS2). Operating Systems 2015 Exam 3 Review Paul Krzyzanowski
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Cryptography & Digital Signatures
Cryptography & Digital Signatures CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration Prof. Sloan s Slides, 2007, 2008 Robert H.
Lecture 10 - Authentication
Lecture 10 - Authentication CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Kerberos: What to know 1) Alice T rent : {Alice + Bob
