Lecture26

Lecture26 - Data and Applications Security Developments and...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #26 Emerging Technologies in Data and Applications Security and Introduction to Biometrics April 16, 2007
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Outline Digital Identity Management Identity Theft Management Digital Forensics Digital Watermarking Risk Analysis Economic Analysis Secure Electronic Voting Machines Biometrics Other Applications Lecture on Introduction to Biometrics
Background image of page 2
Digital Identity Management Digital identity is the identity that a user has to access an electronic resource A person could have multiple identities - A physician could have an identity to access medical resources and another to access his bank accounts Digital identity management is about managing the multiple identities - Manage databases that store and retrieve identities - Resolve conflicts and heterogeneity - Make associations - Provide security Ontology management for identity management is an emerging research area
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Digital Identity Management - II Federated Identity Management - Corporations work with each other across organizational boundaries with the concept of federated identity - Each corporation has its own identity and may belong to multiple federations - Individual identity management within an organization and federated identity management across organizations Technologies for identity management - Database management, data mining, ontology management, federated computing
Background image of page 4
Identity Theft Management Need for secure identity management - Ease the burden of managing numerous identities - Prevent misuse of identity: preventing identity theft Identity theft is stealing another person’s digital identity Techniques for preventing identity thefts include - Access control, Encryption, Digital Signatures - A merchant encrypts the data and signs with the public key of the recipient - Recipient decrypts with his private key
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Digital Forensics Digital forensics is about the investigation of Cyber crime Follows the procedures established for Forensic medicine The steps include the following: - When a computer crime occurs, law enforcement officials who are cyber crime experts gather every piece of evidence including information from the crime scene (i.e. from the computer) - Gather profiles of terrorists - Use history information - Carry pout analysis
Background image of page 6
Digital Forensics - II Digital Forensics Techniques - Intrusion detection - Data Mining - Analyzing log files - Use criminal profiling and develop a psychological profiling - Analyze email messages Lawyers, Psychologists, Sociologists, Crime investigators and Technologists have to worm together International Journal of Digital Evidence is a useful source
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Steganography and Digital Watermarking Steganography is about hiding information within other information - E.g., hidden information is the message that terrorist may be sending to their pees in different parts of the worlds
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/06/2011 for the course CS 6963 taught by Professor Walterbruehs during the Spring '10 term at NYU Poly.

Page1 / 36

Lecture26 - Data and Applications Security Developments and...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online