Security
From Just Solve the File Format Problem
(Difference between revisions)
Dan Tobias (Talk | contribs) |
(→Uncategorized) |
||
(55 intermediate revisions by 3 users not shown) | |||
Line 2: | Line 2: | ||
|formattype=electronic | |formattype=electronic | ||
|thiscat=Security | |thiscat=Security | ||
+ | |image=Padlock green w shadow.png | ||
}} | }} | ||
− | Formats specific to the storage and transmission of security information | + | Formats specific to the storage and transmission of security information. |
− | == Digital | + | ''See also:'' |
+ | * [[Encryption]] | ||
+ | * [[E-Mail, newsgroups, and forums#Secure messaging|E-Mail, newsgroups, and forums: Secure messaging]] | ||
+ | |||
+ | == App provisioning and DRM == | ||
+ | Main article: [[Digital Rights Management]] | ||
+ | |||
+ | * [[Mobile Provision file]] (.mobileprovision; used for installing iOS apps) | ||
+ | |||
+ | == Authentication == | ||
+ | * [[SAML]] (Security Assertion Markup Language) | ||
+ | |||
+ | == Claim representation == | ||
+ | * [[JSON Web Tokens]] (JWT) | ||
+ | |||
+ | == Digital certificates, keys, etc. == | ||
* [[ASCII Armor]] (.arm; old for base64) | * [[ASCII Armor]] (.arm; old for base64) | ||
+ | * [[Card Verifiable Certificate]] (CVC) | ||
* [[Canonical Encoding Rules]] (.cer) | * [[Canonical Encoding Rules]] (.cer) | ||
− | |||
* [[Certificate Revocation List]] (.crl) | * [[Certificate Revocation List]] (.crl) | ||
− | * [[Certificate Signing Request]] | + | * [[Certificate Signing Request]] |
* [[Certificate Trust List]] (.stl) | * [[Certificate Trust List]] (.stl) | ||
− | * [[ | + | * [[DER]] (Distinguished Encoding Rules) |
− | * [[ | + | ** [[DER encoded certificate]] (.der, .crt) |
+ | ** [[DER encoded RSA private key]] | ||
* [[Microsoft Serialized Certificate Store]] (.sst) | * [[Microsoft Serialized Certificate Store]] (.sst) | ||
− | * [[ | + | * [[PEM]] |
− | * [[ | + | ** [[PEM encoded certificate]] (.pem, .crt) |
− | * [[ | + | ** [[PEM encoded RSA private key]] (.key) |
+ | * [[PFX (original format)]] | ||
+ | * [[PGP public key]] | ||
+ | * [[PKCS]] | ||
+ | ** [[PKCS7]] (PKCS #7, Cryptographic Message Syntax Standard) | ||
+ | ** [[PKCS7 certificate]] (.p7b, .p7c, .spc) | ||
+ | ** [[PKCS10]] (PKCS #10 Certificate Signing Request, .p10, .csr) | ||
+ | ** [[PKCS11]] (PKCS #11 Cryptographic Token Interface Standard; Cryptoki API) | ||
+ | ** [[PKCS12]] (PKCS #12, PFX, Personal Information Exchange, .p12, .pfx) | ||
+ | * [[PVK]] | ||
+ | * [[RSA private key]] | ||
+ | * [[SPKAC]] | ||
+ | * [[X.509 certificate]] | ||
− | == | + | === Digital certificate collections === |
− | * [[ | + | |
+ | * [[Security Catalog]] | ||
+ | |||
+ | == Electronic signatures == | ||
+ | * [[Authenticode signature]] | ||
+ | * [[Digital watermark]] | ||
+ | * [[FSecure (PaceSoft)]] | ||
+ | * [[HMAC]] (Hash-based message authentication code) | ||
+ | * [[JSON Web Signatures]] (JWS) | ||
+ | |||
+ | == Malware/spyware == | ||
+ | * [[Pegasus]] | ||
+ | * [[Regin]] | ||
+ | * [[Superfish]] | ||
+ | |||
+ | See also [[Ransomware]]. | ||
+ | |||
+ | == Passwords == | ||
+ | * [[eWallet]] | ||
+ | * [[KBDX]] | ||
+ | * [[passwd]] (/etc/passwd) | ||
+ | |||
+ | See also [[Encryption#Password hashes]]. | ||
+ | |||
+ | == Protocols == | ||
+ | * [[TLS]] (including SSL) | ||
+ | |||
+ | == Security policies == | ||
+ | * [[Adobe Cross Domain Policy File]] | ||
+ | * [[Content Security Policy]] | ||
+ | * [[Label Encodings]] (files determining information classification labels for multi-level security environments) | ||
+ | * [[PAM configuration file]] | ||
+ | * [[Security.txt]] | ||
+ | * [[Sudoers]] (module and file determining user privileges) | ||
+ | |||
+ | == Software == | ||
+ | * [[OpenSSL]] | ||
+ | |||
+ | == Verification == | ||
+ | * [[Verifpal]] (.vp) (language for modeling aspects of security protocols to test for soundness) | ||
+ | |||
+ | == Uncategorized == | ||
+ | * [[C2PA]] | ||
+ | * [[SEAL]] [https://github.com/hackerfactor/SEAL] | ||
− | == | + | == Links and references == |
* [http://blogs.msdn.com/b/kaushal/archive/2010/11/05/ssl-certificates.aspx Various SSL/TLS Certificate File Types/Extensions (MSDN article)] | * [http://blogs.msdn.com/b/kaushal/archive/2010/11/05/ssl-certificates.aspx Various SSL/TLS Certificate File Types/Extensions (MSDN article)] | ||
+ | * [https://hashcat.net/oclhashcat-plus/ Hashcat: password cracking program] | ||
+ | * [http://7habitsofhighlyeffectivehackers.blogspot.com/2013/11/can-someone-be-targeted-using-adobe.html Can someone be targeted using the Adobe breach?] | ||
+ | * [http://xkcd.com/1286/ xkcd comic about Adobe password breach situation] | ||
+ | * [http://pardydba.wordpress.com/2013/11/08/improving-security-in-your-web-browsers-firefox/ Improving security in Firefox] | ||
+ | * [http://www.dustbury.com/archives/17867 2014 Super Bowl security (picture)] | ||
+ | * [http://www.washingtonpost.com/business/technology/senate-cybersecurity-report-finds-agencies-often-fail-to-take-basic-preventive-measures/2014/02/03/493390c2-8ab6-11e3-833c-33098f9e5267_story.html Senate cybersecurity report finds agencies often fail to take basic preventive measures] | ||
+ | * [http://www.bbc.com/news/technology-26879185 Xbox password flaw exposed by five-year-old boy] (And Microsoft thanked the kid instead of getting him arrested, imagine that.) | ||
+ | * [http://dankaminsky.com/2014/04/10/heartbleed/ Be Still My Breaking Heart] | ||
+ | * [http://blog.fastmail.fm/2014/04/10/when-two-factor-authentication-is-not-enough/ When two-factor authentication is not enough] | ||
+ | * [http://www.tedunangst.com/flak/post/origins-of-libressl origins of libressl] | ||
+ | * [http://dheera.net/projects/blur Why blurring sensitive information is a bad idea] | ||
+ | * [http://arstechnica.com/security/2015/04/28/how-to-crack-any-master-lock-combination-in-8-tries-or-less/ How to crack many Master Lock combinations in eight tries or less] |
Latest revision as of 12:35, 16 November 2024
Formats specific to the storage and transmission of security information.
See also:
Contents |
[edit] App provisioning and DRM
Main article: Digital Rights Management
- Mobile Provision file (.mobileprovision; used for installing iOS apps)
[edit] Authentication
- SAML (Security Assertion Markup Language)
[edit] Claim representation
- JSON Web Tokens (JWT)
[edit] Digital certificates, keys, etc.
- ASCII Armor (.arm; old for base64)
- Card Verifiable Certificate (CVC)
- Canonical Encoding Rules (.cer)
- Certificate Revocation List (.crl)
- Certificate Signing Request
- Certificate Trust List (.stl)
- DER (Distinguished Encoding Rules)
- DER encoded certificate (.der, .crt)
- DER encoded RSA private key
- Microsoft Serialized Certificate Store (.sst)
- PEM
- PEM encoded certificate (.pem, .crt)
- PEM encoded RSA private key (.key)
- PFX (original format)
- PGP public key
- PKCS
- PKCS7 (PKCS #7, Cryptographic Message Syntax Standard)
- PKCS7 certificate (.p7b, .p7c, .spc)
- PKCS10 (PKCS #10 Certificate Signing Request, .p10, .csr)
- PKCS11 (PKCS #11 Cryptographic Token Interface Standard; Cryptoki API)
- PKCS12 (PKCS #12, PFX, Personal Information Exchange, .p12, .pfx)
- PVK
- RSA private key
- SPKAC
- X.509 certificate
[edit] Digital certificate collections
[edit] Electronic signatures
- Authenticode signature
- Digital watermark
- FSecure (PaceSoft)
- HMAC (Hash-based message authentication code)
- JSON Web Signatures (JWS)
[edit] Malware/spyware
See also Ransomware.
[edit] Passwords
See also Encryption#Password hashes.
[edit] Protocols
- TLS (including SSL)
[edit] Security policies
- Adobe Cross Domain Policy File
- Content Security Policy
- Label Encodings (files determining information classification labels for multi-level security environments)
- PAM configuration file
- Security.txt
- Sudoers (module and file determining user privileges)
[edit] Software
[edit] Verification
- Verifpal (.vp) (language for modeling aspects of security protocols to test for soundness)
[edit] Uncategorized
[edit] Links and references
- Various SSL/TLS Certificate File Types/Extensions (MSDN article)
- Hashcat: password cracking program
- Can someone be targeted using the Adobe breach?
- xkcd comic about Adobe password breach situation
- Improving security in Firefox
- 2014 Super Bowl security (picture)
- Senate cybersecurity report finds agencies often fail to take basic preventive measures
- Xbox password flaw exposed by five-year-old boy (And Microsoft thanked the kid instead of getting him arrested, imagine that.)
- Be Still My Breaking Heart
- When two-factor authentication is not enough
- origins of libressl
- Why blurring sensitive information is a bad idea
- How to crack many Master Lock combinations in eight tries or less