Security

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
(Security policies)
(Security policies)
(4 intermediate revisions by one user not shown)
Line 12: Line 12:
  
 
== App provisioning and DRM ==
 
== App provisioning and DRM ==
 +
Main article: [[Digital Rights Management]]
 +
 
* [[Mobile Provision file]] (.mobileprovision; used for installing iOS apps)
 
* [[Mobile Provision file]] (.mobileprovision; used for installing iOS apps)
  
Line 52: Line 54:
  
 
== Electronic signatures ==
 
== Electronic signatures ==
 +
* [[Authenticode signature]]
 +
* [[Digital watermark]]
 
* [[HMAC]] (Hash-based message authentication code)
 
* [[HMAC]] (Hash-based message authentication code)
 
* [[JSON Web Signatures]] (JWS)
 
* [[JSON Web Signatures]] (JWS)
Line 73: Line 77:
 
* [[Label Encodings]] (files determining information classification labels for multi-level security environments)
 
* [[Label Encodings]] (files determining information classification labels for multi-level security environments)
 
* [[PAM configuration file]]
 
* [[PAM configuration file]]
 +
* [[Security.txt]]
 
* [[Sudoers]] (module and file determining user privileges)
 
* [[Sudoers]] (module and file determining user privileges)
  
Line 86: Line 91:
 
* [http://www.dustbury.com/archives/17867 2014 Super Bowl security (picture)]
 
* [http://www.dustbury.com/archives/17867 2014 Super Bowl security (picture)]
 
* [http://www.washingtonpost.com/business/technology/senate-cybersecurity-report-finds-agencies-often-fail-to-take-basic-preventive-measures/2014/02/03/493390c2-8ab6-11e3-833c-33098f9e5267_story.html Senate cybersecurity report finds agencies often fail to take basic preventive measures]
 
* [http://www.washingtonpost.com/business/technology/senate-cybersecurity-report-finds-agencies-often-fail-to-take-basic-preventive-measures/2014/02/03/493390c2-8ab6-11e3-833c-33098f9e5267_story.html Senate cybersecurity report finds agencies often fail to take basic preventive measures]
* [http://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management What happens with Digital Rights Management in the real world?]
 
 
* [http://www.bbc.com/news/technology-26879185 Xbox password flaw exposed by five-year-old boy] (And Microsoft thanked the kid instead of getting him arrested, imagine that.)
 
* [http://www.bbc.com/news/technology-26879185 Xbox password flaw exposed by five-year-old boy] (And Microsoft thanked the kid instead of getting him arrested, imagine that.)
 
* [http://dankaminsky.com/2014/04/10/heartbleed/ Be Still My Breaking Heart]
 
* [http://dankaminsky.com/2014/04/10/heartbleed/ Be Still My Breaking Heart]

Revision as of 16:59, 22 September 2017

File Format
Name Security
Ontology

{{{caption}}}

Formats specific to the storage and transmission of security information.

See also:

Contents

App provisioning and DRM

Main article: Digital Rights Management

Authentication

  • SAML (Security Assertion Markup Language)

Claim representation

Digital certificates, keys, etc.

Digital certificate collections

Electronic signatures

Malware/spyware

Passwords

See also Encryption#Password hashes.

Protocols

  • TLS (including SSL)

Security policies

Software

Links and references

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox