Advanced Windows 8 Apps Using JavaScript Jump Start 70-482 Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
Membership, Role Manager and Profile Membership, Role Manager and Profile Matt Gibbs ASP.NET Development Manager.
M4: Multimedia and Devices
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep Advanced Windows 8 Apps Using JavaScript Jeremy Foster Microsoft Developer Evangelist.
Developing Windows 8 Store Apps using HTML5 Refresh / Exam Prep M2: Storage, Networking, and Security Michael Palermo Microsoft Technical Evangelist.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
Microsoft ® Official Course Module 8 Deploying and Managing Certificates.
Windows.Net Programming Series Preview. Course Schedule CourseDate Microsoft.Net Fundamentals 01/13/2014 Microsoft Windows/Web Fundamentals 01/20/2014.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 9: Active Directory Authentication and Security.
Masud Hasan Secue VS Hushmail Project 2.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Sagar Joshi Senior Security Consultant | ACE Team, Microsoft Information Security
The Cryptographic Sensor FTO Libor Dostálek, Václav Novák.
Dynamic Symmetric Key Provisioning Protocol (DSKPP) Mingliang Pei Salah Machani IETF68 KeyProv WG Prague.
Building Windows 8 Apps for the Enterprise Robert Green Technical Evangelist Microsoft Corporation DEV358.
Module 9: Fundamentals of Securing Network Communication.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Introduction to Public Key Infrastructure January 2004 CSG Meeting Jim Jokl.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
Module 3 Configuring File Access and Printers on Windows ® 7 Clients.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
ELECTROINC COMMERCE TOOLS Chapter 6. Outline 6.0 Introduction 6.1 PUBLIC KEY INFRASTRUCTURE (PKI) AND CERTIFICATE AUTHORITIES (CAs) TRUST
1 Integrating digital signatures with relational database: Issues and organizational implications By Randal Reid, Gurpreet Dhillon. Journal of Database.
WSV Problem Background 3. Accelerated Protocols and Workloads 4. Deployment and Management 2. BranchCache Solution Modes 5. BranchCache Protocols.
1 Session 3 Module 4: Java Security Module 5: Cryptography.
Gaming Frameworks for Windows 8 M4: YoYo Games GameMaker Michael Palermo Microsoft Technical Evangelist Jeremy Foster Microsoft Technical Evangelist.
Security fundamentals Topic 4 Encryption. Agenda Using encryption Cryptography Symmetric encryption Hash functions Public key encryption Applying cryptography.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M6: Deployment Jeremy Foster Microsoft Developer Evangelist Michael Palermo Microsoft.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Creating and Managing Digital Certificates Chapter Eleven.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
1 Session 4 Module 6: Digital signatures. Digital Signatures / Session4 / 2 of 18 Module 4, 5 - Review (1)  Java 2 security model provides a consistent.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Advanced Windows Store App Development with HTML5 Refresh / Exam Prep M6: Tools and Asynchronous Programming Jeremy Foster Microsoft Technical.
Review of Microsoft Information Rights Management v1.0 J. Garden, “ A Report for the E-government Unit of the State Services Commission ”, 87 pp., December.
Java Programming: Advanced Topics 1 Building Web Applications Chapter 13.
Secure Data Access with SQL Server 2005 Doug Rees Associate Technologist, CM Group
Mar 18, 2003Mårten Trolin1 Agenda Parts that need to be secured Card authentication Key management.
DreamFactory for Microsoft Azure Is an Open Source REST API Platform That Enables Mobilization of Data in Minutes across Frameworks and Storage Methods.
Advanced Windows 8 App Development Using JavaScript Jump Start Exam Prep M2: Hardware and Sensors Michael Palermo Microsoft Technical Evangelist.
11 | Managing User Info Jeremy Foster Michael Palermo
Web Applications Security Cryptography 1
Hardware-rooted Trust for Secure Key Management & Transient Trust
M5: Packaging and Deployment
e-Health Platform End 2 End encryption
CS691 M2009 Semester Project PHILIP HUYNH
Excel Services Deployment and Administration
M4: Animations, Custom Controls, and Globalization
Data Security for Microsoft Azure
M3: Printing and PlayTo Jeremy Foster Michael Palermo
Developing Universal Windows Apps with HTML and JavaScript
Michael Palermo Jeremy Foster
Presentation transcript:

Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy Foster Microsoft Developer Evangelist

Jump Start Target Agenda Advanced Windows 8 Apps Using JavaScript Module 1: Background Tasks and Components Module 2: Hardware and Sensors Module 3: Printing and PlayTo MEAL BREAK Module 4: Animations, Custom Controls, and Globalization Module 5: Data, Files, and Encryption Module 6: Deployment

Module Agenda Design and implement data caching Save and retrieve files from the file system Secure application data ˃ ˃

Cached data local settings, local files, indexedDb, HTML local storage Caching Expensive data web service, database In-memory data page state, variables, objects, etc.

Azure Caching

Module Agenda Design and implement data caching Save and retrieve files from the file system Secure application data ˃ ˃

Storage options consist of… Application state session state User settings local settings, roaming settings Application data temporary files, local files, roaming files, other? User data document libraries

CODESHOW: STORAGE demo

Module Agenda Design and implement data caching Save and retrieve files from the file system Secure application data ˃ ˃

What Windows 8 can do to protect data… Create symmetric keys Perform symmetric encryption Create asymmetric keys Perform asymmetric encryption Derive password based keys Create message authentication codes (MACs) Hash content Digitally sign content Asynchronous protection of static data Asynchronous protection of a data stream Create a certificate Create a self-signed certificate Install a certificate response Import a certificate in PFX format Use smart card certificates and keys (sharedUserCertificates capabilities set) Use certificates from the user MY store (sharedUserCertificates capabilities set) Specify per application trusted root certificates Specify per application peer trusted certificates Explicitly disable inheritance from system trust Specify the certificate selection criteria

Cryptography namespaces Windows.Security.Cryptography Static class for encoding and decoding data, generating random numbers, and converting between byte arrays and buffers Windows.Security.Cryptography.Certificates Types you can use to create certificate requests and install certificate responses Windows.Security.Cryptography.Core Algorithms for encrypting, signing, and hashing data Windows.Security.Cryptography.DataProtection Encrypt or decrypt static data or a data stream *requires Enterprise Authentication capability and should only be used in enterprise scenarios

CODESHOW: CRYPTOGRAPHY AND ENCRYPTION demo

Summary Design and implement data caching Save and retrieve files from the file system Secure application data