Filters








1,153 Hits in 1.5 sec

Hardening CISCO Devices based on Cryptography and Security Protocols - Part II: Implementation and Evaluation

Faisal Waheed, Maaruf Ali
2018 Annals of Emerging Technologies in Computing  
Encrypted services coupled with best practice configurations are explained and tested in an emulated environment.  ...  A step-by-step hardening approach is detailed using the commands used to secure the proposed network framework's border router.  ...  The passwords are encrypted using the IOS available features such as 'secret' or 'password-encrypt' services. The configurations become more detailed step-by-step.  ... 
doi:10.33166/aetic.2018.04.002 fatcat:27ogqhguyrf7rkjz6kw6vp4qmy

System Hardening Architecture for Safer Access to Critical Business Data

AE Ibor, JN Obidinnu
2015 Nigerian Journal of Technology  
A password should also be of reasonable length, simple to recall by the owner but difficult to guess by an adversary.  ...  Vulnerability can exist in operating systems, network devices, firewalls, encryptions, password protections, embedded systems, and any software driven products.  ... 
doi:10.4314/njt.v34i4.17 fatcat:47ut526y5bhbjhue5mhrtu6g6i

Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

Faisal Waheed, Maaruf Ali
2018 Annals of Emerging Technologies in Computing  
These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System).  ...  Encrypted services coupled with best practice configurations are implemented and tested in an emulated environment.  ...  protocols: • Enabling Secure Shell (SSH) and disabling Telnet • Enabling password encryption service • Enabling HTTPs server transform • Enabling SNMPv3 (encrypted protocol) for monitoring purpose.  ... 
doi:10.33166/aetic.2018.03.004 fatcat:zp3smgjrqjcg5mshw4se6htm6u

AUTHENTICATION MECHANISM ENHANCEMENT UTILISING SECURE REPOSITORY FOR PASSWORDLESS HANDSHAKE

Ioannis A. Pikrammenos, Panagiotis Tolis, Panagiotis Perakis
2019 Zenodo  
This procedure prohibits the transmission of the user's password over the network while still providing the same authentication service.  ...  This elevates the trustworthiness of the mechanism while at the same time it achieves to reduce the overhead of the authentication systems due to the elaborate encryptions procedures.  ...  Another category is the simple use of the system's offered services that has a decisive role only on the services offered.  ... 
doi:10.5281/zenodo.3362914 fatcat:uxoo4chxjjcyvfwghh26i6ebmq

Exposing vulnerabilities in electric power grids: An experimental approach

Luigi Coppolino, Salvatore D׳Antonio, Luigi Romano
2014 International Journal of Critical Infrastructure Protection  
: -A Remote Management Service -An IEEE C37.118 server (typically running on port 4712/4713 TCP/UDP) • A a simple "nmap -v -p -l 65535 -A -O -T5 -PE <device_ip>" command returns the name of the device  ...  simple alphabetic string -This leads to protection against outside hackers while insiders (employees, trojan, …) are still exposed to clear communications Communications, included passwords, can be  ...  ASSESSMENT OF A HARDENED TESTBED Exposing vulnerabilities in electric power grids: An experimental approach 18 Hardened Testbed • Follows recommendations issued by the synchrophasor producers, but not  ... 
doi:10.1016/j.ijcip.2014.01.003 fatcat:cwp2zfol5fc6fdrz5s6vtknkna

Correction

2017 Nature  
Although these services are encrypted and relatively secure, researchers should also encrypt files before uploading them in case the servers are hacked, or their account password is compromised.  ...  This simple step can protect against casual theft and deter all but the most determined hackers.  ... 
doi:10.1038/548124a pmid:28770864 fatcat:436cjamihbcofaafbv2lj6og2u

The (In) Security o Smart Cities: Vulnerabilities, Risks, Mitigation and Prevention

2019 International Journal of Engineering and Advanced Technology  
for future smart city, for better city living and governance, based on cloud computing IoT and distributed computing in accordance with salted hash value added as a prefix and postfix in a generated password  ...  Hardening against IP spoofing Harden against IP spoofing by, 1) avoiding use of trust relationships only, but a combination of password authentication and trust relationships. 2) Using IPsec, and IP wrappers  ...  Aware : Action based on simple computations (Ex Tele Health) 4.  ... 
doi:10.35940/ijeat.e1097.0785s319 fatcat:rtzex4l5xbg7placignd74og2i

Cybersecurity for the travelling scientist

Brian Owens
2017 Nature  
Although these services are encrypted and relatively secure, researchers should also encrypt files before uploading them in case the servers are hacked, or their account password is compromised.  ...  This simple step can protect against casual theft and deter all but the most determined hackers.  ... 
doi:10.1038/548123a pmid:28770861 fatcat:cyhdirxxevbbjlqqd43sks7dmi

Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms [chapter]

Jan Zibuschka, Matthias Herbert, Heiko Roßnagel
2010 Lecture Notes in Computer Science  
We achieve this by implementing a privacy-enhancing identity management system into the Mashup-providing Platform using Reverse Identity Based Encryption.  ...  If there is only one credential available (e.g. password supplied by user), harden it using e.g. iterated hashing using the method described by Halderman et al [22] for hardening the password, creating  ...  Then derive from the hardened credential a Master Key Pair for Identity Based Encryption.  ... 
doi:10.1007/978-3-642-13739-6_18 fatcat:l2xmu6nrpvegnn5x7roz3gj5gy

Hardened Stateless Session Cookies [chapter]

Steven J. Murdoch
2011 Lecture Notes in Computer Science  
This is desirable because it reduces the impact of denial of service attacks and eases database replication issues in load-balanced environments.  ...  Even with knowledge of the server's MAC key the attacker needs a user's password, which is not stored on the server, to create a valid cookie.  ...  Hardened Stateless Session Cookies  ... 
doi:10.1007/978-3-642-22137-8_13 fatcat:ufbwjmfof5bs5nxhf3d7h2uszq

Designing a Pedagogy for an IT Security Course and Textbook

R. Panko
2006 Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06)  
Just as users typically choose weak passwords in password-based authentication, they typically choose weak passwords to generate their preshared key.  ...  The key is often based on a password or pass phrase.  ... 
doi:10.1109/hicss.2006.117 dblp:conf/hicss/Panko06 fatcat:uticjl2dlbbgrnxrdrfhetmwvy

Exploring Security Issues and Solutions in Cloud Computing Services – A Survey

P. Ravi Kumar, P. Herbert Raj, P. Jelciana
2017 Cybernetics and Information Technologies  
The main objective of this paper is to empower a new researcher to figure out the concepts of cloud computing, the services provided by them, and the security issues in the services.  ...  This paper provides a detailed survey on security issues of the services provided by cloud computing and solutions to mitigate them.  ...  A simple authentication scheme is, user enters a login name and password and they are verified against the credentials stored in the computer.  ... 
doi:10.1515/cait-2017-0039 fatcat:u3agpoxhhfcilo6lpvppujzudm

Securing medical records on smart phones

Ryan W. Gardner, Sujata Garera, Matthew W. Pagano, Matthew Green, Aviel D. Rubin
2009 Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems - SPIMACS '09  
To allow for increased usability in situations with low cell-phone reception, we provide the user with an option to bypass this password-hardening step and derive the encryption key directly from the password  ...  The downside of this password-hardening step for the user is that she cannot use her password if her phone does not have network access.  ... 
doi:10.1145/1655084.1655090 fatcat:h7cewjv2p5hrvlp3p5i2xrmj2y

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage [chapter]

Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis
2013 Lecture Notes in Computer Science  
To protect sensitive user data against server-side attacks, a number of security-conscious web applications have turned to client-side encryption, where only encrypted user data is ever stored in the cloud  ...  We formally investigate the security of a number of such applications, including password managers, cloud storage providers, an e-voting website and a conference management system.  ...  A more secure alternative, used by storage services like SpiderOak and password managers like 1Password, is client-side encryption: encrypt all data on the client before uploading it to the website.  ... 
doi:10.1007/978-3-642-36830-1_7 fatcat:nwxomx6655h77c5xbtn3kdeuu4

Securing a HENP Computing Facility [article]

S. Misawa, O. Rind, T. Throwe
2003 arXiv   pre-print
However, depending on the details of the data loss, the recovery process may be short and simple or long and complex.  ...  The email server utilizes a separate password database that is independent of the password database used for interactive access to the core facility.  ... 
arXiv:physics/0306109v1 fatcat:ikzdbt5zynezbowquw65tqd4li
« Previous Showing results 1 — 15 out of 1,153 results