Methods to increase search performance for encrypted databases
|
|
|
- Kelley Christian Bailey
- 9 years ago
- Views:
Transcription
1 Available online at Procedia Economics and Finance 3 ( 2012 ) Emerging Markets Queries in Finance and Business Methods to increase search performance for encrypted databases a, * a Postal code , Romania Abstract Weakly encrypted economic data are vulnerable to numerous attacks that do not require access to decryption keys. To prevent text content discovery by comparing encrypted values, most encryption algorithms include salt value. A distinct salt value encryption generates a very different result. Salt encryption could be a good solution in terms of security of databases, such as a database of social security numbers used in the American system or database of credit card numbers. However, if necessary to seek one record from such a database can be also difficult. Thus, the paper describes three methods to increase search performance of encrypted data Published by Elsevier Ltd. Selection and peer-review under responsibility of the Emerging 2012 The Authors. Published by Elsevier Ltd. Selection and Markets peer review Queries under responsibility in Finance of and Emerging Business Markets local Queries organization in Finance and Business local organization. Keywords: encryption; salt encryption; security; database encryption; 1. Introduction The tools used nowadays for the databases protection and security are numerous and can be implemented on different levels of security with a higher or lower complexity, depending on the environment in which the database server is located and the importance of the stored data. There are several types of database servers, among which some of the most commonly used are: Oracle, Microsoft SQL Server, MySQL and DB2. * Corresponding author. Tel.: address: [email protected] The Authors. Published by Elsevier Ltd. Selection and peer review under responsibility of Emerging Markets Queries in Finance and Business local organization. doi: /s (12)
2 1064 Șerban Mariuța / Procedia Economics and Finance 3 ( 2012 ) In this paper we conducted a case study on the technologies and tools provided by Microsoft SQL Server, technologies which can be found at most competitors. Microsoft SQL Server offers complex instruments for the access of management to databases, offering the possibility of constructing different access architectures, on different levels of security. The tools used for the encryption of data offered by Microsoft SQL Server use a variety of algorithms and encryption keys which can be administrated at database and server level, therefore providing maximum of transparency for the applications to which is connected. The user can manage the keys, by having the advantage of keeping secrets that the administration can not access. The data used in network are vulnerable to attacks because they are found exactly as they are, even if they have been encrypted and decrypted at database server level. For data protection in this case SQL server offers the possibility of securing the transmission channel by using certificates. SQL Server either generates automatically the auto signed certificate used for the channel security or installs a certificate which works explicitly with SQL Server. As the attacks of hackers become more and more complex, so the possibility of new wholes to be left open increases thus, the encryption becomes the last line of defense in the management system of database security. Although the database administrator (DBA) applied the latest patches, secured the database with the latest privileges, used pass-wording systems, the attackers can be smarter and discover certain vulnerabilities because the patches are being used after they have been studied by an attacker which has found also several weak points. Therefore, the encryption can be considered as the latest method of defense for the accidental wholes. The encryption can make the process considerable difficult, that is why when a large amount of data is used, a special attention is given to the encrypting algorithm, the length of the keys used and the size of the text in clear. 2. Using maliciously encrypted data without decrypting them The weakly encrypted data are vulnerable to numerous attacks that do no require access to decryption keys. If a user has access to personal files that contains data which must remain confidential and are non transferable, the mall-intended user can update the content of the file with the encrypted value contained by those data. Subsequently, the user can search the other files tables that contain the same encrypted result; any encrypted values that matches must contain the same values of the initial text. This way, the user can determine the value of an encrypted filed by confirming a previous assumption. SQL Server is protected against these types of attacks. The encryption at database level or volume level is not affected by these problems because any user who has read access of the tables can not see the encrypted data. Most of the encryption algorithms include a salt value in order to prevent the revealing of a text content comparing encrypted values. A very different encryption result is generated by a distinct salt value. When.NET encryption groups are used, the salt value can be specified as an argument for the initialization vector. In SQL Server a random salt value is always applicable to the encryption. The encrypted value can not be compared with the internal functioning of SQL encryption to see if they are equal because the salt value is generated and implicitly included into the encrypted result. However, this is possible for the encrypted data with.net groups as long as the same initialization vector is used. It is not possible to maintain a salt value in SQL Server. To protect against the attacks, the encrypting functions of SQL Server accept a popular authenticator kwon also as the data integration parameter. This corresponds with a primary key of the file or other field which is unique for the given record. The authenticator must provide the same value at encryption because if there is a
3 Șerban Mariuța / Procedia Economics and Finance 3 ( 2012 ) difference, the encryption is abandoned and the error is deleted. This architecture makes impossible a copypaste attack because the encrypted value of the new file will contain a wrong value give by the authenticator. ent from SQL SERVER is varbinary type so that the value can contain whole numbers, unique identifications (GUIDs) or even range type. The initialization vector from the.net encrypting groups is also a binary matrix and can be used in.net groups for similar purposes. The identification columns can be used, but the identification value must be known before. The encryption on a primary key GUID, while the encrypted value can be inserted in the table without the threat of a primary keys conflict. 3. Methods to increase search performance for encrypted databases The salt encryption could represent an efficient solution regarding the security of databases, such as social security numbers used in the American system or the credit card databases security. However, in case we need to search records from this kind of database difficulties may occur. As long as the SQL Server engine is used only for the storage and recovery of encrypted information everything develops normally and without problems. The sorting or comparison data operations decrease the performance of this searching engine because this encryption technique prevent the users and the searching engine their implementation. Such sorting involves the individual decryption of each record as the perfect registration is looked for, the time necessary for this operation being very high. There are several approaches that increase the performance, but affect their security. Thus, three methods are described: The first method means to encrypt the text without using a salt value or a consistent salt value. When the search is performed, the term looked for is encrypted by using the same salt value and the binary output is compared with the encrypted value in the databases. The simple identical texts should generate identical encryptions. The encrypted data increase the exposure to attacks and permit the users to correctly confirm the values considered of the simple text. Moreover, the data can not be protected against the copy-paste attacks, which can be realized by using the authenticator argument. Because SQL Server uses salt values for the data encryption, this method can be implemented only for using the.net groups through the extension of the SQL Server with.net groups that offers a significant advantage types. The frequent use of the internal encryption function from SQL Server, EncryptByKey, except when the encryption is made with another key and also the ensuring of the authenticator argument are measures recommended by this method. This method creates encrypting fully salted value which benefits from a robust protection against the attacks. Applying this method involves the creation of a column which contains the hash value of the initial value from the simple text. The lowercase () function is used if the type of search is not sensible to the type of characters. To execute this kind of search the hash value is compared with the values from the new column. The comparison of the returned value of the hash function permits the rapid execution of the interrogation. A hash result on 20 bytes is obtained by using the HashBytes function and the SHA-1 specification algorithm; ideal would be that the type of data of the result hash column to be chosen on binary type (20). If the MD4 algorithm or MD4 algorithm is used the hash result obtained is on 16 bytes which can also represent a unique identifier. If multiple records which have identical hash value must be decrypted and then compared with the searching term of the initial text we can use a single SQL query.
4 1066 Șerban Mariuța / Procedia Economics and Finance 3 ( 2012 ) The encryption vulnerability is high compared with a user who considers as known the encrypted values and receives the confirmation by comparing them with the hash values, but a mall indented user can not copy the encrypted value from another record. Because the hash values are not salt, they are vulnerable to certain type of attacks and to frequently analysis because there is the possibility to determine the encrypted value based on their frequency. The third method is similar to the previous one as regarding the encryption of salt values adding an additional hash column which is not salt where the hash values are truncated or even limited as numerical precision. Because the previous method must harmonize with the hashes doubles, this method refers to the harmonization of the duplicates. The advantage of this approach is the low clarity of the hash values which make possible two random values from the initial text to generate the same hash value, thus the hashes are less vulnerable to frequent analysis. The hash functions are used mostly to signatures ensuring though their length a high level of security because two messages do not generate the same hash value. It is therefore almost impossible that another message to generate the same hash value. A relevant example of this method is to presume that the hash method has been reduced to one byte, tinyint type or 256 distinct values. The search using the encrypting salt records can be faster, because the number of records which need an individual decryption could be approximately 256 times lower, presuming a constant distribution. However, any attacker which tries to verify the encrypted value implicates to have a 1:256 cote in order to match the absolute hash value that can offer limited confirmation of this assumption. The number of hash values that matches is directly proportional with the number of rows contained into a table. The clarity of the hash values is inversely proportional with the number of rows from the table. The Bitewise-And (& ;) is used to determine the numerical precision of the hash result for the bytes filtration. The method permits the accurate specification of the hash value clarity, the wanted number of bytes and the offline modification of the hash value precision. An alternative approach of the hash matches is to truncate or reduce the precision of the initial text value and then to create a hash which is not salt starting from this value, offering a control over the distribution and the match precision of the hashes. The advantage offered by this method is represented by the realized equilibrium between the data security, the table dimension and the search performance. Is hard to find an universal solution because the correct answer depends on the size of the table, the frequency of the search and the critical necessity to maintain the secret of the initial data text. 4. The quantitative testing of the encryption methods offered by SQL Server A database named test, with records was implement to storage the data that helped to the test the encryption of the Value table, using TDE and comparing the time of execution of SELECT ALL, SELECT RANGE, SELECT MATCH instructions. For the quantitative testing using the first method of encryption, described above, a new database named test2 was implemented, with also records. In the Value table a new column is created, entitled ENCRYPTION_SUM, where all the encrypted values are stored from the column Sum, observing the execution time of the same instructions: SELECT ALL, SELECT RANGE, and SELECT MATCH. Identical instructions are tested into a salt encrypted column because for identical values from the SUM column the encrypted values are the same. Because the search time from an encrypted value column is high, a new data base, test4, is implemented. In the Value table of the database a new column entitled HASH_SUM is introduced, which will contain the hash values of the values from the SUM column and the same types of search are tested in HASH_SUM column.
5 Șerban Mariuța / Procedia Economics and Finance 3 ( 2012 ) The disadvantage of this encryption is similar to the simple encryption, namely: obtaining identical hash values to identical information. To use the third method to increase the performance of the encrypted data a new column is introduced which storages only the first octet of the hash value. The quantitative comparison of the time necessary for tested encrypting methods and the time necessary for different search types is illustrated in the following table: Table 1: Time required for interrogation in a encrypted database No. records Encryption method Type of search Time/seconds TDE Column encryption Salt column encryption Hash encryption Hash truncated encryption SELECT ALL 4 SELECT RANGE 1 SELECT MATCH 0 Total encryption 10 SELECT ALL 5 SELECT RANGE 0 SELECT MATCH 0 Total encryption 13 SELECT ALL 7 SELECT RANGE 1 SELECT MATCH 1 Total encryption 16 SELECT ALL 6 SELECT MATCH 0 Total encryption 12 SELECT ALL 6 SELECT MATCH 1 5. Conclusions The encryption solutions desired by database users present more options in SQL Server and Windows. These options are not mutually exclusive. The different levels of encryption available in SQL Server and Windows can be used to trigger the defense system in depth and to globally secure the database. The transparent encryption of data offers a series of facilities, such as: the easy administration and use, the performance and security ensuring. TDE provides a global defense because the database remains encrypted, even when is moved to different locations. Both the backup and the snapshots are protected, without requiring support from the server administrator. The most common problem related to the functionality of cryptography is that it is used to address and not to solve problems. Situations that are frequently encountered can be grouped into two categories of examples: using asymmetric key pairs in situations when communicating the key is not an issue, such as data stored in a SQL Server database;
6 1068 Șerban Mariuța / Procedia Economics and Finance 3 ( 2012 ) using encryption for data access control. In SQL Server permissions are robust and designed for this. The only exception occurs when access to the mass-media storage may be compromised, encryption adding a significant level of security. The best part of the cryptographic functioning of SQL Server is the fact that is relatively simple to create a robust security. The simplicity of this application ensures a superior quality of security to those users who depend on it to protect their data. Although SQL Server provides powerful tools for encryption and verification, most often these are not understood well enough, which can lead to a poor or incomplete implementation. Acknowledgements Many sincere thanks to my supervisor, Prof. dr. Horia-Ioan Georgescu, who accepted me as PhD. Sudent and who guided me and offered me a great support in my research. References Barnes R.. Database Security and Auditing: Leading Practices. Enterprise Auditing Solutions Applications Security; T.I.... Editura Matrix Rom;2003. Crampton J. Cryptographically-enforced hierarchical access control with multiple keys. The Journal of Logic and Algebraic Programming 78.; 2009, pag Fusaru D. Arhitectura bazelor de date Hicks J., Criptography in SQL Server Hsueh S. Database encryption in SQL Server 2008 Enterprise Edition Lesov P. Database Security: A Historical Perspective. University of Minnesota. CS 8701; Patriciu VV, Ene- M, Bica, Voicu N. Editura All ;2001. Srikanth, Radhakrishna., Database security best practices Annals of Spiru Hart University, Economic Series, Volumul 2(11); 2011, pag , ISSN , -M., 2012, Security Solutions for Data at Rest, 19th International Economic Conference IECS June 15, 2012, The Persistence of the Global Economic Crisis: Causes, Implications, Solutions, Lucian Blaga University of Sibiu. -M., 2012, Improving continuously encrypting databases, Arad Academic Days 22 nd Edition, Universitatea de Vest -M., 2012, Criptarea unei baze de date utilizând algoritmi ce includ o valoare salt i 2012, Universitatea Spiru Haret.
Transparent Data Encryption: New Technologies and Best Practices for Database Encryption
Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
Defense In-Depth to Achieve Unbreakable Database Security
Defense In-Depth to Achieve Unbreakable Database Security Qiang Lin, Ph.D Abstract Enterprises realize that sole reliance on generic security mechanisms does not provide the protection they need for their
CPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006
Fixity Checks: Checksums, Message Digests and Digital Signatures Audrey Novak, ILTS Digital Preservation Committee November 2006 Introduction: Fixity, in preservation terms, means that the digital object
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Database Security. Database Security Requirements
Database Security Laurie Williams [email protected] John Slankas [email protected] Physical database integrity Logical database integrity Element integrity Auditability Access Control User Authentication
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Microsoft SQL Server Security and Auditing Clay Risenhoover ISACA North Texas April 14, 2016 http://tinyurl.com/isacaclay
Microsoft SQL Server Security and Auditing Clay Risenhoover ISACA North Texas April 14, 2016 http://tinyurl.com/isacaclay 2016, Risenhoover Consulting, Inc. All Rights Reserved 1 Goals Understand new and
Debunking The Myths of Column-level Encryption
Debunking The Myths of Column-level Encryption Vormetric, Inc. 888.267.3732 408.433.6000 [email protected] www.vormetric.com Page 1 Column-level Encryption Overview Enterprises have a variety of options
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
Introduction to IT Security
Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 30 November 2015 Marek Rychly ES, 30 November
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon
1 Common security requirements Basic security tools Secret-key cryptography Public-key cryptography Example Online shopping with Amazon 2 Alice credit card # is xxxx Internet What could the hacker possibly
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Database and Data Mining Security
Database and Data Mining Security 1 Threats/Protections to the System 1. External procedures security clearance of personnel password protection controlling application programs Audit 2. Physical environment
Columbia University Web Security Standards and Practices. Objective and Scope
Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Hack Your SQL Server Database Before the Hackers Do
Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually
HP Quality Center. Upgrade Preparation Guide
HP Quality Center Upgrade Preparation Guide Document Release Date: November 2008 Software Release Date: November 2008 Legal Notices Warranty The only warranties for HP products and services are set forth
SQL Server Encryption Overview. September 2, 2015
SQL Server Encryption Overview September 2, 2015 ABOUT ME Edmund Poillion Data Platform Systems Engineer Skyline Associate since 1999 Started in App Dev, changed focus to SQL Server in 2012 Email: [email protected]
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Notes on Network Security - Introduction
Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY
CLOUD COMPUTING SECURITY ARCHITECTURE - IMPLEMENTING DES ALGORITHM IN CLOUD FOR DATA SECURITY Varun Gandhi 1 Department of Computer Science and Engineering, Dronacharya College of Engineering, Khentawas,
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Security in Android apps
Security in Android apps Falco Peijnenburg (3749002) August 16, 2013 Abstract Apps can be released on the Google Play store through the Google Developer Console. The Google Play store only allows apps
CipherShare Features and Benefits
CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS
SECURITY ANALYSIS OF A SINGLE SIGN-ON MECHANISM FOR DISTRIBUTED COMPUTER NETWORKS Abstract: The Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Securing PostgreSQL From External Attack
Securing From External Attack BRUCE MOMJIAN January, 2012 systems are rich with attack vectors to exploit. This presentation explores the many potential external vulnerabilities and shows how they can
Victor Shoup Avi Rubin. fshoup,[email protected]. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,[email protected] Abstract In this paper, we investigate a method by which smart
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
4. Identify the security measures provided by Microsoft Office Access. 5. Identify the methods for securing a DBMS on the Web.
Topic 8 Database Security LEARNING OUTCOMES When you have completed this Topic you should be able to: 1. Discuss the important of database security to an organisation. 2. Identify the types of threat that
GUIDE TO SYBASE SECURITY
GUIDE TO SYBASE SECURITY [email protected] Company: Network Intelligence India Pvt. Ltd. http://www.nii.co.in Date: 31 st January 2003 Guide to Sybase Security Introduction: This article provides a detailed
Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT
26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment
Keywords Cloud Computing, CRC, RC4, RSA, Windows Microsoft Azure
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cloud Computing
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
Microsoft.NET Passport, a solution of single sign on
Microsoft.NET Passport, a solution of single sign on Zheng Liu Department of Computer Science University of Auckland [email protected] Abstract: As the World Wide Web grows rapidly, accessing web-based
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
SQL Injection January 23, 2013
Web-based Attack: SQL Injection SQL Injection January 23, 2013 Authored By: Stephanie Reetz, SOC Analyst Contents Introduction Introduction...1 Web applications are everywhere on the Internet. Almost Overview...2
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
Hushmail Express Password Encryption in Hushmail. Brian Smith Hush Communications
Hushmail Express Password Encryption in Hushmail Brian Smith Hush Communications Introduction...2 Goals...2 Summary...2 Detailed Description...4 Message Composition...4 Message Delivery...4 Message Retrieval...5
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Security Goals Services
1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;
TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS
TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS Technical audits in accordance with Regulation 211/2011 of the European Union and according to Executional Regulation 1179/2011 of the
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
Peer-to-peer Cooperative Backup System
Peer-to-peer Cooperative Backup System Sameh Elnikety Mark Lillibridge Mike Burrows Rice University Compaq SRC Microsoft Research Abstract This paper presents the design and implementation of a novel backup
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Division of IT Security Best Practices for Database Management Systems
Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES
A Framework for Secure and Verifiable Logging in Public Communication Networks
A Framework for Secure and Verifiable Logging in Public Communication Networks Vassilios Stathopoulos, Panayiotis Kotzanikolaou and Emmanouil Magkos {v.stathopoulos, p.kotzanikolaou}@adae.gr [email protected]
Vormetric Data Security
Vormetric Data Security Next Steps for Product Evaluation and Adoption Albert Dolan Systems Engineer EMEA In Depth Architecture Demonstration POC Data Transformation Deployment Use Cases Defense in Depth
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
