Monday, January 24, 2011

Security Webinar Authentication and Cryptography

Brief Overview:

I will be presenting a session on  "Authentication and Cryptography," I will examine the following topics:

  • Verifying who is a user and to what they have access
  • Different ways a user can be validated to computer and network resources
  • How Cryptograph is used to protect data
  • Symmetric and Symmetric Encryption
  • What are hashes?

In our webinar session on February 23, 2011, we will discuss Using Encryption to Protect Your Data. In the last webinar of this series entitled Disaster Recovery, we will take this information from theory and show you how to use this technology.

Outline:

In this session we will cover:

  • Identification:
    • Something a user knows
    • Something a user possesses
    • Something a user is or does
  • Issues
    • Distribution
    • Cost
    • Tracking
  • Elements
  • Password Protocols
  • Hashes
  • Kerberos
  • Cryptography Benefits
    • Confidentiality
      • Encryption
    • Integrity
      • Message digests
    • Authentication
      • Public-key cryptography
    • Non-repudiation
      • Digital signatures
  • Symmetric Encryption
  • Asymmetric Process
  • Digital Signatures
  • Certificate Authorities
  • Models
  • Lifecycle
  • Distribution

To attend this session on  2/9/2011 at  Time: 12:00 PM ET

Click Here

Then on February 23, 2011, I will discuss Using Encryption to Protect Your Data. In the last webinar of this series entitled Disaster Recovery, we will take this information from theory and show you how to use this technology.

Other session that you may want to look at include

Cyber Security Part One: Identity Theft

Understanding Cyber Security Physical Security

Understanding Cyber Security Risk Management