Security

From Just Solve the File Format Problem
(Difference between revisions)
Jump to: navigation, search
(App provisioning and DRM)
(Electronic signatures)
(5 intermediate revisions by 2 users not shown)
Line 12: Line 12:
  
 
== App provisioning and DRM ==
 
== App provisioning and DRM ==
See also [[Digital Rights Management]].
+
Main article: [[Digital Rights Management]]
  
 
* [[Mobile Provision file]] (.mobileprovision; used for installing iOS apps)
 
* [[Mobile Provision file]] (.mobileprovision; used for installing iOS apps)
Line 54: Line 54:
  
 
== Electronic signatures ==
 
== Electronic signatures ==
 +
* [[Authenticode signature]]
 
* [[Digital watermark]]
 
* [[Digital watermark]]
 +
* [[FSecure (PaceSoft)]]
 
* [[HMAC]] (Hash-based message authentication code)
 
* [[HMAC]] (Hash-based message authentication code)
 
* [[JSON Web Signatures]] (JWS)
 
* [[JSON Web Signatures]] (JWS)
  
 
== Malware/spyware ==
 
== Malware/spyware ==
 +
* [[Pegasus]]
 
* [[Regin]]
 
* [[Regin]]
 
* [[Superfish]]
 
* [[Superfish]]
Line 76: Line 79:
 
* [[Label Encodings]] (files determining information classification labels for multi-level security environments)
 
* [[Label Encodings]] (files determining information classification labels for multi-level security environments)
 
* [[PAM configuration file]]
 
* [[PAM configuration file]]
 +
* [[Security.txt]]
 
* [[Sudoers]] (module and file determining user privileges)
 
* [[Sudoers]] (module and file determining user privileges)
  
 
== Software ==
 
== Software ==
 
* [[OpenSSL]]
 
* [[OpenSSL]]
 +
 +
== Verification ==
 +
* [[Verifpal]] (.vp) (language for modeling aspects of security protocols to test for soundness)
  
 
== Links and references ==
 
== Links and references ==
Line 89: Line 96:
 
* [http://www.dustbury.com/archives/17867 2014 Super Bowl security (picture)]
 
* [http://www.dustbury.com/archives/17867 2014 Super Bowl security (picture)]
 
* [http://www.washingtonpost.com/business/technology/senate-cybersecurity-report-finds-agencies-often-fail-to-take-basic-preventive-measures/2014/02/03/493390c2-8ab6-11e3-833c-33098f9e5267_story.html Senate cybersecurity report finds agencies often fail to take basic preventive measures]
 
* [http://www.washingtonpost.com/business/technology/senate-cybersecurity-report-finds-agencies-often-fail-to-take-basic-preventive-measures/2014/02/03/493390c2-8ab6-11e3-833c-33098f9e5267_story.html Senate cybersecurity report finds agencies often fail to take basic preventive measures]
* [http://www.theguardian.com/technology/blog/2014/feb/05/digital-rights-management What happens with Digital Rights Management in the real world?]
 
 
* [http://www.bbc.com/news/technology-26879185 Xbox password flaw exposed by five-year-old boy] (And Microsoft thanked the kid instead of getting him arrested, imagine that.)
 
* [http://www.bbc.com/news/technology-26879185 Xbox password flaw exposed by five-year-old boy] (And Microsoft thanked the kid instead of getting him arrested, imagine that.)
 
* [http://dankaminsky.com/2014/04/10/heartbleed/ Be Still My Breaking Heart]
 
* [http://dankaminsky.com/2014/04/10/heartbleed/ Be Still My Breaking Heart]

Revision as of 17:21, 4 June 2022

File Format
Name Security
Ontology

{{{caption}}}

Formats specific to the storage and transmission of security information.

See also:

Contents

App provisioning and DRM

Main article: Digital Rights Management

Authentication

  • SAML (Security Assertion Markup Language)

Claim representation

Digital certificates, keys, etc.

Digital certificate collections

Electronic signatures

Malware/spyware

Passwords

See also Encryption#Password hashes.

Protocols

  • TLS (including SSL)

Security policies

Software

Verification

  • Verifpal (.vp) (language for modeling aspects of security protocols to test for soundness)

Links and references

Personal tools
Namespaces

Variants
Actions
Navigation
Toolbox