Password Security & Software Encryption n John Barthmaier n October 21, 2009.

Slides:



Advertisements
Similar presentations
COMPUTER MALWARE FINAL PROJECT PROPOSAL THE WAR AGAINST CAPTCHA WITH IMPLEMENTATION OF THE WORLDS MOST ACCURATE CAPTCHA BREAKER By Huy Truong & Kathleen.
Advertisements

Conventional Encryption: Algorithms
CS470, A.SelcukCryptographic Authentication1 Cryptographic Authentication Protocols CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Jeff Bilger - CSE P 590TU - Winter 2006 The Role of Cryptography in Combating Software Piracy.
Computer and Network Security Mini Lecture by Milica Barjaktarovic.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Iron Key and Portable Drive Security Zakary Littlefield.
Chap 3: Key exchange protocols In most systems, we distinguish the short term keys from the long term ones: –A short term key (session key) is used to.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Securing iSCSI for Data Backup and Disaster Recovery JAMES HUGHES CS526 5/03/05 James W. Hughes 1.
CYBER CRIME AND SECURITY TRENDS
Linux Security.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
SSH Secure Login Connections over the Internet
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
CIS 450 – Network Security Chapter 8 – Password Security.
Article Title: “Token-based Graphical Password Authentication” Authors: John Charles Gyorffy Andrew F. Tappenden James Miller Presenter: Patrick Centanni.
Crypto Bro Rigby. History
Introduction to Stream Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
ECE509 Cyber Security : Concept, Theory, and Practice Cryptography Spring 2014.
LOGO Hardware side of Cryptography Anestis Bechtsoudis Patra 2010.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Chapter 4 – Protection in General-Purpose Operating Systems Section 4.5 User Authentication.
Security and Ethics Privacy Employment Health Crime Working
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
Abusing : Weaknesses in LEAP Challenge/Response – Defcon 2003 Slide 1 Weaknesses in LEAP Challenge/Response Joshua Wright
( Secure Lightweight Integrated Chat System) A networking project from DUCA 2012 SLICS.
How Safe are They?. Overview Passwords Cracking Attack Avenues On-line Off-line Counter Measures.
Lecture 2: Introduction to Cryptography
Class 4 Asymmetric Cryptography and Trusting Internal Components CIS 755: Advanced Computer Security Spring 2014 Eugene Vasserman
Cryptography Fundamentals
Chapter 6 Authenticating People. FIGURE 6.0.F01: Authentication to protect computer resources.
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Potential vulnerabilities of IPsec-based VPN
TCOM Information Assurance Management Software Hacking.
Welcome Topic : Security.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Preventing MySQL Injection Sonja Parson COSC 5010 Security Presentation April 26, 2005.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
CS426Fall 2010/Lecture 51 Computer Security CS 426 Lecture 5 Cryptography: Cryptographic Hash Function.
COEN 351 Authentication. Authentication is based on What you know Passwords, Pins, Answers to questions, … What you have (Physical) keys, tokens, smart-card.
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
Network Security and Cryptography
E-Commerce and Security Dr. John P. Abraham Professor University of Texas Pan American.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
1 Figure 1-6: Attacks and Defenses (Study Figure) Access Control  Access control is the body of strategies and practices that a company uses to prevent.
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Encryption Power Crunch Tyler Morgan. Encryption & Cryptography What it is, methods, and brief description of cryptography.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Calgary Computer Security Solutions
Securing Information Systems
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
MODUS OPERANDI OF CYBER CRIME
The Best Way To Secure U R Self
Security.
Prepared By : Binay Tiwari
IT & Security Training Skills.
Hiding Information, Encryption, and Bypasses
Security.
Exercise: Hashing, Password security, And File Integrity
Security.
Presentation transcript:

Password Security & Software Encryption n John Barthmaier n October 21, 2009

Brief Overview of Password Security n How is Password Authenticated? n What techniques are employed? n Fresh approaches to encryption n Hack attacks, SPAM, etc. n Everyday solutions

Password Authentication n Encrypted channels n Hash-based challenge response n Zero-knowledge password n Changing of passwords n Password longevity

Fresh approaches to encryption n DES n AES n Cryptography Hash Functions n Secure Hash algorithms

Everyday solutions n Change password n Force a minimum of 8 characters n Periodic changes n Random Generator n Limit number of failures

Hacks, Attacks and Software Issues n Telecommunications failures during 9/11 n Fiber sabotage n Cyber attacks(China as well) n Lights Out n Lovcsan worm, Nachi worm & Sobig.F virus

Software used in Password Security n Password protect software n Lastbit.com n Password Managers Password Managers n Password Generators Password Generators n Password Recovery Software Password Recovery Software n Password Security Software Password Security Software n USB Password Software USB Password Software n Auto Login Software Auto Login Software

Questions????? n Where is Password Security headed? n How can Passwords be improved? n Are there techniques that are foolproof? n ?????????????