Auditing Cryptography: Assessing System Security

نویسنده

  • Steve Stanek
چکیده

Steve Stanek 78.1 Assessing Risk ..................................................................... 1023 78.2 Encryption’s Number-One Problem: Keeping Keys Secret........................................................................... 1024 78.3 Encryption’s Number-One Rule........................................ 1024 78.4 Remember to Encrypt E-Mail ........................................... 1025 Does the Vendor Have Credibility in Security Circles? † Does the Product Use Well-Known Cryptographic Algorithms? † Does the Product Use SSL v3.0? † Does the Company Report and Post Bug Fixes for Security Weaknesses? † Does the Product Use an Accepted Random Number Generator to Create Keys? † Does the Product Allow for Easy Integration of Hardware Tokens to Store Keys? † Has the Product Received a Federal Information Processing Standards (FIPS) 140-1 Verification?

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamic Auditing Protocol using Improved RSA and CBDH for Cloud Data Storage

In the current era of cloud computing, Cloud storage is a significant service of cloud computing where data stored in the cloud is being generated at high speed and thus the cloud storage system has become one of the key components in cloud computing. Data owner host their data and data consumers can use the data on and from the server. The security issue arises due to the data outsourcing. Thi...

متن کامل

Dynamic Data Integrity and Checkpoint Recovery Using Public Auditing in Cloud Storage

Cloud computing brings great challenges in the field of data security and security assurance. In this paper, we are analysing the different types of cloud security issues. The key and signature are generated using the elliptic curve cryptography algorithm and Ron Rivest, AdiShamir and Leonard Adlema algorithm to provide efficient security. Dynamic Merkle hash tree is constructed for providing d...

متن کامل

Elliptic Curve Cryptography Digital Signature Algorithm For Privacy-Preserving Public Auditing For Shared Data In The Cloud

Cloud computing becomes one of the emerging technology on now a days to share and manage their data in organization , because of its forcefulness, small communication cost and everywhere environment. Privacy preservation concern in the cloud computing becomes arise several security challenges since information stored in the cloud data is easily outsourced anywhere at any time. To manage this pr...

متن کامل

An adaptive security framework for evaluating and assessing security implementations in PaaS cloud models

ion +Operating System Host Level Threats Virtualisation Security OS Patching Malware prevention/detection Auditing/Logging Software Updates

متن کامل

Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy

In cloud storage service, clients upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of clients' stored data, cloud server(CS) must prove to a verifier that he is actually storing all of the client's data unchanged. And, enabling public auditability for cloud storage is of critical importance to users with constrained com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Information Systems Security

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2002