SecuritySoftwareFailures

SecuritySoftwareFailures - ANNOUNCEMENTS Check class...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
ANNOUNCEMENTS Check class announcements daily You must implement programming projects by yourself 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
FINAL EXAM INFORMATION The final exam for the course will be a common final exam (all sections in one room, taking the exam at the same time). FINAL EXAM INFORMATION DATE: Friday Dec 16 TIME: 4pm-6pm LOCATION: CSIC 1115 We have verified this information with the school. Ignore any other time/date you may see in the university web site. 2
Background image of page 2
3 SECURITY (EMAIL) Least secure of internet protocols Avoid sending sensitive information (e.g., passwords) over e- mail Provide e-mail addresses in web sites in a way is not easily recognized by spam programs Use at rather than @ Put an image with the e-mail Avoid mailto Use JavaScript to generate e-mail address Encrypt the message using PGP (Pretty Good Privacy) or GPG (GNU Privacy Guard) http://www.wbwip.com/wbw/emailencoder.html
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4 SECURITY (PASSWORD-PROTECTED SITES) Approach not recommended Store encrypted password Decrypt password and compare against user provided password Better approach Store encrypted password Encrypt provided password and compare against stored password
Background image of page 4
5 SECURITY (ENCRYPTION) Encryption process of converting plaintext into ciphertext Decryption process of converting ciphertext into plaintext Symmetric cryptography sender and receiver share the same key Asymmetric (Public Key) cryptography sender and receiver have different, complementary keys Symmetric cryptography Relatively fast compared to asymmetric Drawbacks Keys must be change frequently How to distribute the key safely
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 17

SecuritySoftwareFailures - ANNOUNCEMENTS Check class...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online