Security
"Security Practices"
- Attacks
- 2FA second_factor
-
Certificates
-
Certificate Authorities
- GoDaddy
- Network Solutions
- Thawte
- VeriSign
- Chain Policy
- https://www.lifewire.com/cheap-ssl-certificates-and-recommendations-3469539
- Security Patterns
- Security Tokens
- Scans, Analysis
GIS security guidelines
Security Flaws
- Incremental Counters
- Two Factor Authentication
Security Threats
SQL injections
JavaScript injections
end-to-end encryption
computer forensics
computer security training services
www.pcworld.com
minor annoyance vs major catastrophe
https://www.troyhunt.com/our-password-hashing-has-no-clothes/
Tor
Psiphon
Lantern
Open Whisper Systems
Signal
* DNS Poisoning
* BGP Hijacking
attack vector
-------------------
authentication
authorization
-------------------
simple login
credential vs. token
federated
SSO
.NET Java (JVM)
OWIN Java Servlet / Servlet Containers
OAuth
token based authentacation
---------------------
Hotel Key Card Analogy
---------------------
xor^-1(0) = xor(0, 0) = xor(1, 1) 1 bit -> 2 input
xor^-1(1) = xor(1, 0) = xor(0, 1) 1 bit -> 2 input
(00) = xor(00, 00) = (11 11) = (10, 10) = (01, 01)
(01)
(10)
(11)
2 bit -> 4 input
n bits -> 2^n variations -> (2^n)^2 possibilities
8 bits -> 256 variations
3 bits -> 8 variations -> 64 possibilities