Auditing Cryptography: Assessing System Security
نویسنده
چکیده
Steve Stanek 78.1 Assessing Risk ..................................................................... 1023 78.2 Encryption’s Number-One Problem: Keeping Keys Secret........................................................................... 1024 78.3 Encryption’s Number-One Rule........................................ 1024 78.4 Remember to Encrypt E-Mail ........................................... 1025 Does the Vendor Have Credibility in Security Circles? † Does the Product Use Well-Known Cryptographic Algorithms? † Does the Product Use SSL v3.0? † Does the Company Report and Post Bug Fixes for Security Weaknesses? † Does the Product Use an Accepted Random Number Generator to Create Keys? † Does the Product Allow for Easy Integration of Hardware Tokens to Store Keys? † Has the Product Received a Federal Information Processing Standards (FIPS) 140-1 Verification?
منابع مشابه
Dynamic Auditing Protocol using Improved RSA and CBDH for Cloud Data Storage
In the current era of cloud computing, Cloud storage is a significant service of cloud computing where data stored in the cloud is being generated at high speed and thus the cloud storage system has become one of the key components in cloud computing. Data owner host their data and data consumers can use the data on and from the server. The security issue arises due to the data outsourcing. Thi...
متن کاملDynamic Data Integrity and Checkpoint Recovery Using Public Auditing in Cloud Storage
Cloud computing brings great challenges in the field of data security and security assurance. In this paper, we are analysing the different types of cloud security issues. The key and signature are generated using the elliptic curve cryptography algorithm and Ron Rivest, AdiShamir and Leonard Adlema algorithm to provide efficient security. Dynamic Merkle hash tree is constructed for providing d...
متن کاملElliptic Curve Cryptography Digital Signature Algorithm For Privacy-Preserving Public Auditing For Shared Data In The Cloud
Cloud computing becomes one of the emerging technology on now a days to share and manage their data in organization , because of its forcefulness, small communication cost and everywhere environment. Privacy preservation concern in the cloud computing becomes arise several security challenges since information stored in the cloud data is easily outsourced anywhere at any time. To manage this pr...
متن کاملAn adaptive security framework for evaluating and assessing security implementations in PaaS cloud models
ion +Operating System Host Level Threats Virtualisation Security OS Patching Malware prevention/detection Auditing/Logging Software Updates
متن کاملPublic Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy
In cloud storage service, clients upload their data together with authentication information to cloud storage server. To ensure the availability and integrity of clients' stored data, cloud server(CS) must prove to a verifier that he is actually storing all of the client's data unchanged. And, enabling public auditability for cloud storage is of critical importance to users with constrained com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Information Systems Security
دوره 11 شماره
صفحات -
تاریخ انتشار 2002