Using RFID Technology to Stop Counterfeiting
|
|
|
- Anissa Whitehead
- 9 years ago
- Views:
Transcription
1 Using RFID Technology to Stop Counterfeiting By Eustace Asanghanwa, Crypto & RF Memory Applications Summary RFID technology is well known for providing labeling solutions to automate inventory control. It is less known for its capability to offer anti-counterfeiting solutions. While providing cryptographic authentication schemes with data protection capabilities, a well implemented RFID security solution provides complete product protection against illegal cloning, intellectual property theft, and denial-of-service attacks. Atmel Corporation 2325 Orchard Parkway San Jose, CA TEL (408) FAX (408) Web Site:
2 Table of Contents Using RFID Technology to Stop Counterfeiting... 1 Introduction... 3 Understanding the Problem of Counterfeit... 3 RFID and Product Labeling... 3 Assuring Product Authenticity with RFID... 4 Password Protection...5 Encrypted Labels...5 Challenge-Response Protection...5 Double Challenge-Response Protection...5 Adding Optional Security for Data Protection... 6 Write Protection...6 Data Encryption...6 Message Authentication Codes...7 Choosing the Proper RFID Security Solution... 7 Conclusion A RFID 06/07
3 Introduction Many people understand RFID as a next-generation barcode with technology to automate inventory control. Few people understand this technology can also protect against counterfeiting and even fewer have knowledge of how or what to consider when shopping for the right anti-counterfeit solution. This paper provides insights to the problem of counterfeit, how RFID technology can combat it, considerations for a complete RFID security solution, and what to look for when shopping for the right anti-counterfeiting RFID solution. Understanding the Problem of Counterfeit Counterfeiting entails illegal cloning of products with the sole intent of deriving economic benefit. The overriding incentive for counterfeiting is easy money without the associated intellectual property and product development costs, quality and reliability concerns. Product manufacturers pay dearly for counterfeiting including brand erosion, loss of market share, intellectual property value dilution, customer support for non-authentic products, and bad will. Classic solutions to counterfeiting have been tamper resistant/evident packaging, and special label markings. High value consumables like pharmaceuticals, electronics, accessories and cosmetics in today s markets provide incentive for counterfeiters to make capital investments for reproduction of packages and labels to enable cloning. Once they manufacture the appropriate packages and/or labels, they apply them to cheap imitations of the product and go to market. Because the counterfeiter has not incurred the costs typically associated with product development, they quickly cover their capital investments at the expense of the authentic product manufacturer. Counterfeiters have the motivation to surmount any packaging and labeling barriers and often achieve product cloning quite easily. This is because all of the information required for authentication is physically present with the product. Today s products require more advanced solutions to combat product counterfeiting. Effective solutions will require products to carry only part of the authentication information. The manufacturer can keep the other part and so controls production of the product. Holding back a piece of product authentication information as an anti-counterfeit solution works best when dealing with labels. RFID secure labeling provides this capability and requires proper implementation for effectiveness. RFID and Product Labeling RFID provides labeling technology like barcodes but with greater capability. Barcodes encode product-labeling information like names and serial numbers but nothing more. They require direct line-of-sight for access, can store only small amounts of information, and have minimum size requirements for effectiveness. As such, small sized items present challenges for item level barcode labeling. RFID technology, on the other hand, embeds labeling information in non-volatile memory devices, which in turn embeds in a product. Unlike barcodes, RFID tags come in various sizes sometimes as small as a grain of rice, have greater storage capacity, and do not require direct line-of-sight for access. The absence of size and line-of-sight limitations allows RFID tags to embed virtually into A RFID 06/07
4 any product for flexible labeling down to the item level. This capability enables automatic tracking and inventory control with strategically placed interrogators. Assuring Product Authenticity with RFID RFID labeling with proper security measures can assure product authenticity and prevent illegal cloning. The necessary precondition for the effectiveness of this scheme is for the product to withhold information until after assuring the authenticity of the interrogator. To achieve this, the tag must expect the interrogator to provide information proving its authenticity. This piece of information is one that only an authentic manufacturer can provide. The tag thus issues cryptographic challenges to the interrogator and will not give out labeling information unless the interrogator provides the proper response. This challenge-response scheme, illustrated in Figure 1, constitutes the proper RFID labeling security necessary to combat cloning. Since the interrogator initiates communications in most RFID protocols, the tag will need to have the challenge always ready. The interrogator would read the challenge and generate a response for the tag to validate. The tag updates its challenge upon a successful response. Counterfeiters, not possessing the proper response to the challenge, will never obtain the labeling information from the device and thus have nothing to duplicate. For example, a shoe manufacturer like Nike may choose to protect its brand and products from piracy using RFID technology. If they embed authentication tags within the shoes, then distributors willing to build a reputation around distributing authentic products can obtain proper interrogator devices from the shoe manufacturer and consumers can feel confident they are purchasing authentic products. High end shoe manufacturers may also find interest in equipping major shopping centers with public authentication checking devices (interrogators) for consumers to validate purchases from hawkers. In either of these cases, pirated products will not pass the validation tests. Unfortunately, many existing RFID security solutions do not possess this challengeresponse scheme thus lacking the infrastructure to protect against counterfeiting. The next few paragraphs highlight some existing solutions and their adequacy. Figure 1. Challenge Response Sequence: Tag Updates Challenge after Every Successful Challenge Response. Tag current challenge always available for interrogator to read Interrogator Challenge RFID Interrogator Interrogator Secret Interrogator Response Tag releases label information if response is valid Product Label RFID Security Tag Embedded in Product A RFID 06/07
5 Password Protection Widely used protection scheme but unfortunately the weakest. All it takes is the breach of a single password to retrieve a tag label for duplication. Some tags may implement rollingpassword schemes that enhance sophistication but the fact of the matter is that it remains a password protection scheme. It only takes a single password compromise to completely expose the product for illegal cloning. Encrypted Labels Some manufactures go through the pains of encrypting the labels using very strong cryptographic algorithms. They may choose to store these labels in tags possessing password security already for added protection. Unfortunately, counterfeiters do not need to decrypt or understand the labels in order to duplicate them. This protection scheme remains as trivial as that offered by password protection. Challenge-Response Protection This scheme requires that tags authenticate interrogators before divulging information. The tags issue interrogators cryptographic challenges for which only interrogators possessing certain secret information are able to respond correctly. By managing interrogator side secrets, authentic manufacturers will possess the ability to prevent counterfeiters from reading their product information thus preventing illegal cloning of their product. Double Challenge-Response Protection Similar to the challenge-response scheme with additional ability for the interrogator to also challenge the tag as illustrated in Figure 2. This scheme requires both interrogators and tags to independently store asymmetric secrets to use in the process. This mutual authentication scheme provides assurance to both authentic interrogator and tag about each other s authenticity. This is particularly useful where authentic interrogators need to provide field updates to authentic tags. For example, interrogators in a mobile electronic application, like smart phone firmware upgrade equipment at a supplier location may need to ascertain the authenticity of the tag (product) before issuing a firmware upgrade. This mutual authentication scheme provides for very powerful counterfeit protection A RFID 06/07
6 Figure 2. Double Challenge-Response Scheme Adding Optional Security for Data Protection The challenge-response and double challenge-response RFID security schemes provide effective anti-counterfeiting solutions. These solutions by themselves, however, do not offer data protection for data communication between the interrogator and the tag. An eavesdropper, for instance, can wait until completion of the challenge-response process, and intercept information between interrogator and tag. Depending on the application, they may even modify the information to suite their needs. For example, a malevolent eavesdropper with a competing product can intentionally inject errors in a firmware upgrade to a competitor s consumer electronic product to achieve a classic denial-ofservice attack. Such eavesdroppers may also inject false information into the competitor s authentic consumables, be it electronic or not, to make them appear non-authentic. A more complete solution to RFID label security thus requires data protection in addition to authentication for most applications. The following paragraphs outline useful data protection schemes with standalone adequacy or in combination depending on the application. Write Protection Offered by tags with the ability to lock the data contained within to prevent future modification. This is well suited for pure labeling applications with static label information. Write protection alone may be adequate for the protection of products like pharmaceuticals and consumables including cosmetics, accessories, and apparels. Data Encryption Offered by tags with the ability to encrypt information traffic between the interrogator and the tag. Encrypting data between the interrogator and tag assures the confidentiality of the data in transmission. Data confidentially may be useful both in protecting secrets or preventing man-in-the-middle attacks. This protection scheme will be useful in applications where field upgrades are necessary A RFID 06/07
7 Message Authentication Codes Message authentication codes (MAC) are cryptographic digests that allow the recipient of information to ascertain the authenticity of the source and integrity of the data content. MAC generation uses cryptographic secrets stored within the interrogator and tag. For any given message, only an authentic interrogator or tag can issue the proper MAC. The sender of data thus generates a MAC to accompany the data. The recipient of the data verifies the MAC. If the MAC does not checkout, it either implies that the source of the message is not authentic, the integrity of the message is questionable (i.e. message has been modified since it left the source), or there were channel communication errors. The combination of data encryption and use of MAC provides powerful data protection to field updates like firmware upgrades to electronic products. Choosing the Proper RFID Security Solution Conclusion Many RFID tags offer some level of security but choosing the proper security for your application is the only way to protect your product. The proper security for anticounterfeiting, at the minimum, requires the RFID tag to possess the ability to authenticate the interrogator prior to divulging labeling information. This provides the authentic product manufacturer control over tag label access by controlling cryptographic secrets needed by interrogators. This prevents counterfeiters from accessing product labels within the tags. There are two things to consider when shopping for an RFID anti-counterfeiting solution: 1. Ensure the RFID tag offers authentication capability prior to access of label information stored within the tag. Look for the challenge-response scheme in applications where the interrogators only need to identify the tag. Look for the double challenge-response scheme (mutual authentication) in applications where interrogators may also need to modify information stored within the tag or product. For example, have interrogators perform mutual authentication with the tags embedded within a consumer electronic device before issuing a firmware upgrade to the product. 2. Ensure the RFID tag offers adequate data protection capability for your application. Look for tags with write protection for applications that require labeling information remain fixed and where the labeling information does not need to be confidential. Look for tags with data encryption and MAC capability for applications requiring assurance of data confidentiality and integrity, and source authenticity. An example of such an application is issuance of firmware upgrades to consumer electronics where the authenticity of the electronic product needs ascertaining, and also where the firmware intellectual property and integrity need protection. RFID technology can stop product counterfeiting. Combating product counterfeiting requires a paradigm shift from embedding product authentication information within the product to having the authentic manufacturer withhold and control a piece of that information. RFID provides the necessary technology, to include single and double challenge-response authentication security schemes. A complete RFID product protection solution needs to also consider data protection. Data protection schemes include write A RFID 06/07
8 protection, data encryption, and use of Message Authentication Codes (MAC). Depending on the application, a combination of the right authentication and data protection security schemes can provide complete product protection A RFID 06/07
9 Editor's Notes About Atmel Corporation Founded in 1984, Atmel Corporation is headquartered in San Jose, California with manufacturing facilities in North America and Europe. Atmel designs, manufactures and markets worldwide, advanced logic, mixed-signal, nonvolatile memory and RF semiconductors. Atmel is also a leading provider of system-level integration semiconductor solutions using CMOS, BiCMOS, SiGe, and high-voltage BCDMOS process technologies. Further information can be obtained from Atmel s Web site at Contact: Eustace Asanghanwa, Crypto & RF Memory Applications, Colorado Springs, Colorado, USA, Tel: (719) , [email protected] 2007 Atmel Corporation. All rights reserved. Atmel, logo and combinations thereof, and others, are registered trademarks or trademarks of Atmel Corporation or its subsidiaries. Other terms and product names may be trademarks of others A RFID 06/07
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
CRYPTOMEMORY POWERFUL SECURITY AT LOW COST
CRYPTOMEMORY POWERFUL SECURITY AT LOW COST By Eustace Asanghanwa, Crypto & RF Memory Applications Summary Many systems and products have the need to combat piracy or securely store information. Secure
Atmel s Self-Programming Flash Microcontrollers
Atmel s Self-Programming Flash Microcontrollers By Odd Jostein Svendsli, Marketing Manager Summary The third-generation Flash microcontrollers from Atmel are now available. These microcontrollers offer
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview
Application Note Atmel CryptoAuthentication Product Uses Atmel Abstract Companies are continuously searching for ways to protect property using various security implementations; however, the cost of security
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
AN INTRODUCTION TO THE GLOBAL DOCUMENT TYPE IDENTIFIER (GDTI) TABLE OF CONTENTS
TABLE OF CONTENTS What Is a Global Document Type Identifier?... 3 What Is a GDTI Used For?... 3 Key Attributes of the GDTI... 3 Business Benefits of Using GDTIs... 4 How Is the GDTI Formed?... 4 Frequently
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
AVR1318: Using the XMEGA built-in AES accelerator. 8-bit Microcontrollers. Application Note. Features. 1 Introduction
AVR1318: Using the XMEGA built-in AES accelerator Features Full compliance with AES (FIPS Publication 197, 2002) - Both encryption and decryption procedures 128-bit Key and State memory XOR load option
More Secure, Less Costly IoT Edge Node Security Provisioning
More Secure, Less Costly IoT Edge Node Security Provisioning Authors: Nicolas Schieli, Sr. Director, Secure Products Group Ron Ih, Sr. Manager, Marketing and Business Development Eustace Asanghanwa, Manager,
Voltage's Encrypted Email
Voltage's Encrypted Email October 2004. Report #471 Ferris Research Product Brief Sponsored by Ferris Research, Inc. 408 Columbus Ave., Suite 1 San Francisco, Calif. 94133, USA Phone: +1 (415) 986-1414
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Strong Security in Multiple Server Environments
White Paper Strong Security in Multiple Server Environments VeriSign OnSite for Server IDs Contents 1. Introduction 1 2. Security Solutions: The Digital ID System 2 2.1. What Is a Digital ID? 2 2.2 How
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
E-Book Security Assessment: NuvoMedia Rocket ebook TM
E-Book Security Assessment: NuvoMedia Rocket ebook TM July 1999 Prepared For: The Association of American Publishers Prepared By: Global Integrity Corporation 4180 La Jolla Village Drive, Suite 450 La
Software Hardware Binding with Quiddikey
Software Hardware Binding with Quiddikey Mass scale solution against software piracy Secure your digital life Software-Hardware Binding solutions are typically required for Flash-based systems in which
Enhancing Organizational Security Through the Use of Virtual Smart Cards
Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1
Encryption, Data Integrity, Digital Certificates, and SSL Developed by Jerry Scott 2002 SSL Primer-1-1 Ideas Behind Encryption When information is transmitted across intranets or the Internet, others can
Acceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
Acceptable Use Policy
Acceptable Use Policy Free Use Disclaimer: This policy was created by or for the SANS Institute for the Internet community. All or parts of this policy can be freely used for your organization. There is
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
PrivyLink Cryptographic Key Server *
WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
How To Use Atmel'S Atmel Crypto Device For A Year On A Computer Or Cell Phone
Atmel Crypto Products Portfolio Family of Secure Authentication Solutions Atmel Crypto Products Portfolio The Atmel Crypto Products Portfolio offers full system security solution options for a wide variety
SecureD Technical Overview
WHITEPAPER: SecureD Technical Overview WHITEPAPER: SecureD Technical Overview CONTENTS section page 1 The Challenge to Protect Data at Rest 3 2 Hardware Data Encryption Provides Maximum Security 3 3 SecureD
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Cisco Trust Anchor Technologies
Data Sheet Cisco Trust Anchor Technologies Overview Cisco Trust Anchor Technologies provide the foundation for trustworthy systems across Cisco. The Cisco Trust Anchor and a Secure Boot check of signed
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
NOT ALL CODES ARE CREATED EQUAL
NOT ALL CODES ARE CREATED EQUAL Why some serial numbers are better than others. Verify Brand 3033 Campus Drive, Minneapolis MN 55441 [email protected] (763) 235-1400 EXECUTIVE SUMMARY Serial numbers
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
MovieLabs Specification for Enhanced Content Protection Version 1.0
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
Card Not Present Fraud Webinar Transcript
Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Understanding and Integrating KODAK Picture Authentication Cameras
Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.
TETRA Security for Poland
TETRA ASSOCIATION TETRA Security for Poland Brian Murgatroyd TETRA ASSOCIATION former Chairman Security and Fraud Prevention Group Warren Systems (SFPG) Independent Security Consultant [email protected]
Application Note. Atmel ATSHA204 Authentication Modes. Prerequisites. Overview. Introduction
Application Note Atmel Authentication Modes Prerequisites Hardware Atmel AT88CK454BLACK Evaluation Board Atmel AT88CK109STK8 Kit Software Atmel Crypto Evaluation Studio (ACES) Overview Understand which
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
Authentication Types. Password-based Authentication. Off-Line Password Guessing
Authentication Types Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4:
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Efficient Asset Tracking: From Manual to Automated
White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies
INTRODUCTION TO CRYPTOGRAPHY
INTRODUCTION TO CRYPTOGRAPHY AUTHOR: ANAS TAWILEH [email protected] Available online at: http://www.tawileh.net/courses/ia This work is released under a Creative Commons Attribution-ShareAlike 2.5 License
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
APPLICATION NOTE. Secure Personalization with Transport Key Authentication. ATSHA204A, ATECC108A, and ATECC508A. Introduction.
APPLICATION NOTE Secure Personalization with Transport Key Authentication ATSHA204A, ATECC108A, and ATECC508A Introduction The Atmel CryptoAuthentication ATSHA204A, ATECC108A, and ATECC508A devices (crypto
2.4: Authentication Authentication types Authentication schemes: RSA, Lamport s Hash Mutual Authentication Session Keys Trusted Intermediaries
Chapter 2: Security Techniques Background Secret Key Cryptography Public Key Cryptography Hash Functions Authentication Chapter 3: Security on Network and Transport Layer Chapter 4: Security on the Application
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Multi-Factor Authentication
Enhancing network security through the authentication process Multi-Factor Authentication Passwords, Smart Cards, and Biometrics INTRODUCTION Corporations today are investing more time and resources on
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Security. Definitions
Security While protection has been discussed throughout the class kernel vs. user mode, protected memory, file permissions these mechanisms have generally been focused on protection from accidental misuse
WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email
WHITE PAPER Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting Email EXECUTIVE SUMMARY Data Loss Prevention (DLP) monitoring products have greatly
43% Figure 1: Targeted Attack Campaign Diagram
TrendLabs Data exfiltration is the final stage of a targeted attack campaign where threat actors steal valuable corporate information while remaining undetected. 1 43% of most serious threats to the company
Responsible Access and Use of Information Technology Resources and Services Policy
Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong
GT 6.0 GSI C Security: Key Concepts
GT 6.0 GSI C Security: Key Concepts GT 6.0 GSI C Security: Key Concepts Overview GSI uses public key cryptography (also known as asymmetric cryptography) as the basis for its functionality. Many of the
WHY YOU NEED AN SSL CERTIFICATE
GO DADDY TECHNICAL BRIEF ecommerce SECURITY WHY YOU NEED AN SSL CERTIFICATE In the world of electronic commerce, security is paramount. Although Web sales are on the rise, widespread fears about sending
Using CryptoMemory in Full I 2 C Compliant Mode. Using CryptoMemory in Full I 2 C Compliant Mode AT88SC0104CA AT88SC0204CA AT88SC0404CA AT88SC0808CA
Using CryptoMemory in Full I 2 C Compliant Mode 1. Introduction This application note describes how to communicate with CryptoMemory devices in full I 2 C compliant mode. Full I 2 C compliance permits
Security Requirements for RFID Computing Systems
International Journal of Network Security, Vol.6, No.2, PP.214 226, Mar. 2008 214 Security Requirements for RFID Computing Systems Xiaolan Zhang 1 and Brian King 2 (Corresponding author: Xiaolan Zhang)
Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
Oracle Retail Point-of-Service with Mobile Point-of-Service
Oracle Retail Point-of-Service with Mobile Point-of-Service Release Notes Release 13.4.1 September 2012 Oracle Retail Mobile Point-of-Service was previously released as a standalone product. This Release
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features
Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
OPC UA vs OPC Classic
OPC UA vs OPC Classic By Paul Hunkar Security and Communication comparison In the world of automation security has become a major source of discussion and an important part of most systems. The OPC Foundation
Hang Seng HSBCnet Security. May 2016
Hang Seng HSBCnet Security May 2016 1 Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
Security Policy. Trapeze Networks
MP-422F Mobility Point Security Policy Trapeze Networks August 14, 2009 Copyright Trapeze Networks 2007. May be reproduced only in its original entirety [without revision]. TABLE OF CONTENTS 1. MODULE
Acceptable Use Policy
Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture
Insight Guide. Encryption: A Guide
Encryption: A Guide for Beginners If you read anything about information security, you re likely to have come across the word encryption. It s a fundamental building block when it comes to securing your
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
SSL A discussion of the Secure Socket Layer
www.harmonysecurity.com [email protected] SSL A discussion of the Secure Socket Layer By Stephen Fewer Contents 1 Introduction 2 2 Encryption Techniques 3 3 Protocol Overview 3 3.1 The SSL Record
WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users
Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users Table of Contents How TrustDefender Mobile Works 4 Unique Capabilities and Technologies 5 Host Application Integrity
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology
Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY
Authentication. Computer Security. Authentication of People. High Quality Key. process of reliably verifying identity verification techniques
Computer Security process of reliably verifying identity verification techniques what you know (eg., passwords, crypto key) what you have (eg., keycards, embedded crypto) what you are (eg., biometric information)
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
