Security
From Just Solve the File Format Problem
(Difference between revisions)
(→Security policies) |
(→Security policies) |
||
(4 intermediate revisions by one user not shown) | |||
Line 12: | Line 12: | ||
== App provisioning and DRM == | == App provisioning and DRM == | ||
+ | Main article: [[Digital Rights Management]] | ||
+ | |||
* [[Mobile Provision file]] (.mobileprovision; used for installing iOS apps) | * [[Mobile Provision file]] (.mobileprovision; used for installing iOS apps) | ||
Line 52: | Line 54: | ||
== Electronic signatures == | == Electronic signatures == | ||
+ | * [[Authenticode signature]] | ||
+ | * [[Digital watermark]] | ||
* [[HMAC]] (Hash-based message authentication code) | * [[HMAC]] (Hash-based message authentication code) | ||
* [[JSON Web Signatures]] (JWS) | * [[JSON Web Signatures]] (JWS) | ||
Line 73: | Line 77: | ||
* [[Label Encodings]] (files determining information classification labels for multi-level security environments) | * [[Label Encodings]] (files determining information classification labels for multi-level security environments) | ||
* [[PAM configuration file]] | * [[PAM configuration file]] | ||
+ | * [[Security.txt]] | ||
* [[Sudoers]] (module and file determining user privileges) | * [[Sudoers]] (module and file determining user privileges) | ||
Line 86: | Line 91: | ||
* [http://www.dustbury.com/archives/17867 2014 Super Bowl security (picture)] | * [http://www.dustbury.com/archives/17867 2014 Super Bowl security (picture)] | ||
* [http://www.washingtonpost.com/business/technology/senate-cybersecurity-report-finds-agencies-often-fail-to-take-basic-preventive-measures/2014/02/03/493390c2-8ab6-11e3-833c-33098f9e5267_story.html Senate cybersecurity report finds agencies often fail to take basic preventive measures] | * [http://www.washingtonpost.com/business/technology/senate-cybersecurity-report-finds-agencies-often-fail-to-take-basic-preventive-measures/2014/02/03/493390c2-8ab6-11e3-833c-33098f9e5267_story.html Senate cybersecurity report finds agencies often fail to take basic preventive measures] | ||
− | |||
* [http://www.bbc.com/news/technology-26879185 Xbox password flaw exposed by five-year-old boy] (And Microsoft thanked the kid instead of getting him arrested, imagine that.) | * [http://www.bbc.com/news/technology-26879185 Xbox password flaw exposed by five-year-old boy] (And Microsoft thanked the kid instead of getting him arrested, imagine that.) | ||
* [http://dankaminsky.com/2014/04/10/heartbleed/ Be Still My Breaking Heart] | * [http://dankaminsky.com/2014/04/10/heartbleed/ Be Still My Breaking Heart] |
Revision as of 16:59, 22 September 2017
Formats specific to the storage and transmission of security information.
See also:
Contents |
App provisioning and DRM
Main article: Digital Rights Management
- Mobile Provision file (.mobileprovision; used for installing iOS apps)
Authentication
- SAML (Security Assertion Markup Language)
Claim representation
- JSON Web Tokens (JWT)
Digital certificates, keys, etc.
- ASCII Armor (.arm; old for base64)
- Card Verifiable Certificate (CVC)
- Canonical Encoding Rules (.cer)
- Certificate Revocation List (.crl)
- Certificate Signing Request
- Certificate Trust List (.stl)
- DER (Distinguished Encoding Rules)
- DER encoded certificate (.der, .crt)
- DER encoded RSA private key
- Microsoft Serialized Certificate Store (.sst)
- PEM
- PEM encoded certificate (.pem, .crt)
- PEM encoded RSA private key (.key)
- PFX (original format)
- PGP public key
- PKCS
- PKCS7 (PKCS #7, Cryptographic Message Syntax Standard)
- PKCS7 certificate (.p7b, .p7c, .spc)
- PKCS10 (PKCS #10 Certificate Signing Request, .p10, .csr)
- PKCS11 (PKCS #11 Cryptographic Token Interface Standard; Cryptoki API)
- PKCS12 (PKCS #12, PFX, Personal Information Exchange, .p12, .pfx)
- PVK
- RSA private key
- SPKAC
- X.509 certificate
Digital certificate collections
Electronic signatures
- Authenticode signature
- Digital watermark
- HMAC (Hash-based message authentication code)
- JSON Web Signatures (JWS)
Malware/spyware
Passwords
See also Encryption#Password hashes.
Protocols
- TLS (including SSL)
Security policies
- Adobe Cross Domain Policy File
- Content Security Policy
- Label Encodings (files determining information classification labels for multi-level security environments)
- PAM configuration file
- Security.txt
- Sudoers (module and file determining user privileges)
Software
Links and references
- Various SSL/TLS Certificate File Types/Extensions (MSDN article)
- Hashcat: password cracking program
- Can someone be targeted using the Adobe breach?
- xkcd comic about Adobe password breach situation
- Improving security in Firefox
- 2014 Super Bowl security (picture)
- Senate cybersecurity report finds agencies often fail to take basic preventive measures
- Xbox password flaw exposed by five-year-old boy (And Microsoft thanked the kid instead of getting him arrested, imagine that.)
- Be Still My Breaking Heart
- When two-factor authentication is not enough
- origins of libressl
- Why blurring sensitive information is a bad idea
- How to crack many Master Lock combinations in eight tries or less