The development and usage of software has seen a wide spread the last decade, and software systems are now present...
Security Engineering
The evolution of computing we've seen during the last decent has permitted a lot of improvements that make the use...
Internet has opened new market ways and gave a new vision and new methods of selling products. Ecommerce was a...
The copyright and protection of innovation is not only restricted to audio, video, books and software, it can sometimes concern...
Previously suggested digital content copyright protection systems (e.g., Pay-TV, DVD) are generally all broken. Do you think it is possible...
Attacks can be from internal or external sources and good security officers should plan and define measure to avoid or...
The appearance of Internet and the wide connection and interconnection of networks helped attackers thinking of wider and massive attacks,...
OS hardening To protect against misconfiguration-based attacks, install the very good hardening utility Bastille (http://sourceforge.net). Bastille essentially closes all the...
Introduction to physical tamper-resistant devices Developing a secure computer system is not only a matter of design and prediction of...
Another method or implementation of cryptography is the Identity based which derives from the public-key cryptography. Initially developed by Shamir...
Security can be considered at different levels, we can think about how can we make our connexions secure and avoid...
The proliferation of systems and their use by different entities and organisations raised a lot of questions about the security...
Authentication code In a military system, authentication should be secure unconditionally. Note that we studied digital signatures and message authentication...
The Clark-Wilson Model Author : Yongge Wang Confidentiality, integrity, and availability are three essential properties for both military and commercial...
We depend more and more on Internet technology. Everyday we interact and perform some tasks related to our life over...
Security has always been a major concern far before the appearance of computers, it had different applications and implementation but...
Microsoft plays a major role in the computing domain and is considered one of the leaders in term of solutions...
Security as a major concern can be addressed from different angles, even the security specialists might have different definitions and...
Attackers might have different reasons to think and try targeting systems. Depending on the technologies and protocols, attackers can use...