Security Webinar Authentication and Cryptography

Brief Overview:

I will be presenting a session on  "Authentication and Cryptography," I will examine the following topics:

  • Verifying who is a user and to what they have access
  • Different ways a user can be validated to computer and network resources
  • How Cryptograph is used to protect data
  • Symmetric and Symmetric Encryption
  • What are hashes?

In our webinar session on February 23, 2011, we will discuss Using Encryption to Protect Your Data. In the last webinar of this series entitled Disaster Recovery, we will take this information from theory and show you how to use this technology.

Outline:

In this session we will cover:

  • Identification:
    • Something a user knows
    • Something a user possesses
    • Something a user is or does
  • Issues
    • Distribution
    • Cost
    • Tracking
  • Elements
  • Password Protocols
  • Hashes
  • Kerberos
  • Cryptography Benefits
    • Confidentiality
      • Encryption
    • Integrity
      • Message digests
    • Authentication
      • Public-key cryptography
    • Non-repudiation
      • Digital signatures
  • Symmetric Encryption
  • Asymmetric Process
  • Digital Signatures
  • Certificate Authorities
  • Models
  • Lifecycle
  • Distribution

To attend this session on  2/9/2011 at  Time: 12:00 PM ET

Click Here

Then on February 23, 2011, I will discuss Using Encryption to Protect Your Data. In the last webinar of this series entitled Disaster Recovery, we will take this information from theory and show you how to use this technology.

Other session that you may want to look at include

Cyber Security Part One: Identity Theft

Understanding Cyber Security Physical Security

Understanding Cyber Security Risk Management

 

Active Directory Federation Services 2.0 RTW Update

Active Directory Federation Services 2.0 helps IT enable users to collaborate across organizational boundaries and easily access applications on-premises and in the cloud, while maintaining application security. Through a claims-based infrastructure, IT can enable a single sign-on experience for end-users to applications without requiring a separate account or password, whether applications are located in partner organizations or hosted in the cloud.

The Windows Server 2008 R2 setup package for AD FS 2.0 was updated on 1/5/2011. This updated package contains hotfixes that will prevent the errors described in the following support articles from occurring whenever AD FS 2.0 is installed on a server running the Windows Server 2008 R2 operating system:

Get the update here

 

Windows Upgrade Starter to Home Premium Deal

The current deal is if you buy a netbook with starter you can upgrade to Home Premium  for only 19.95 !  You just need to purchase Windows anytime upgrade at the same time !

Windows Anytime Upgrade?

With Windows Anytime Upgrade: Windows 7 Starter to Home Premium, your customers can upgrade their new netbook PC safely, quickly, and easily. Then they can customize it with themes and photos and enjoy entertainment anywhere. By taking advantage of this offer, customers get everything in Windows 7 Starter, plus more:

  • Live Preview See lots of open programs and windows at a glance with live taskbar previews.
  • Netflix – Customers can watch what they want in one place. With Windows Media Center and a Netflix account, they can stream thousands of movies and TV shows directly from Netflix.
  • Internet TV – Use Windows Media Center to find and watch a variety of TV shows on the Internet.
  • Remote Media Streaming – Customers can go on the road without taking all their entertainment. They can enjoy music, photos, and videos from their home PC with remote media streaming in Windows Media Player.
  • Desktop Personalization – Help your customers make their PC look the way they want. They can personalize their desktop with their own photos, themes, and sounds.

* For Internet TV, you’ll need Internet access. Free Internet TV content varies by geography. Some content may require additional fees. Internet TV is not available in all countries.

 

Offer is good Nov 7 to April 2 while supplies last

Cell Phone a Security Nightmare?

Is a cell a phone was just a phone?

The current cells phone today is smart phones with more power that you desktop that 7 years old. Think of what you keep on your phone, Mail Contact, Schedules, and other data what would happen if that device was lost or stolen or compromised and theft or you competing got that information

Here are some simple things to do.

Don’t Lose Your Phone – Know where you phone is at all times and do not leave it out at bars and public places, Keep it with you. Do not leave it in you parked car.

Lock you phone and set a password (a strong one not 1111, 1234 etc.)

Here’s how to find time-out settings on various smartphone OSs:

    • Android: now supports PINs and passwords
    • BlackBerry: enable the password, and set the security time-out options.
    • Windows Phones: can set or change the password, and also set the screen time-out.

Remote wipe means that if your phone is lost or stolen, you can remotely clear all of your data–including e-mail, contacts, texts, and documents–off of the handset, thus keeping that information out of the wrong hands. Check with you Company or Phone provide about this service

Trojan Horses, Malware, and Viruses and Third-Party Apps

  • Software protection: like Lookout that can protect the Phone and the anti-viruses manufacture have software as well.
  • Third-Party Apps can become an issue, once an apps is installed it can access to your personal data and location. You need to think or ask what the app does and what information will it share?

Microsoft Security Essentials free to small Businesses.

Microsoft Security Essentials will become free to use for organizations with up to 10 PCs.

Originally released last year for single-PC use at home, Microsoft Security Essentials was designed as a comprehensive security solution in a lightweight package.

Microsoft Security Essentials can be downloaded, installed and put to work with just a few clicks. Upon installation, it scans the PC to make sure it’s clean from the start. Once Microsoft Security Essentials is working, it downloads updates and schedules scans on its own.

Over the past year, the product has won awards and certifications from a number of independent agencies, such as ICSA Labs, West Coast Labs and PC Advisor, and last January, PC Advisor named Microsoft Security Essentials to its list of the “Best Free Software.”

This is a full-featured, top-tier security solution that Microsoft is offering to small businesses for free. You don’t need a credit card. It requires no registration, no trials, no renewals. It doesn’t collect any credit card information. It runs well on older hardware. It’s easy to use, easy to get, and it’s from a trusted source. Basically, Microsoft Security Essentials just works.”

But if the product is so successful, why offer it for free? According to Microsoft’s internal research, although 80 percent of PC owners in the U.S. say they have the most up-to-date antivirus protection, in reality only half that many actually do. Often they have signed up for free trials or subscription-based services that have lapsed. Others are just using outdated versions of security software on older hardware.

Microsoft Security Essentials is now available in 74 markets worldwide and 25 languages. To learn more about Microsoft Security Essentials and download the product for free, visit http://www.microsoft.com/security_essentials/.

 

Copy-and-Paste Coming to Windows Phone 7

A series of Windows Phone 7 updates are coming over the next few months, including adding the copy-and-paste feature and improving the phone’s performance when loading or switching between applications.

Microsoft also is working to make Windows Phone 7 available from Sprint and Verizon in the first half of 2011, and more languages will become available later this year.

 

New Microsoft Touch Mouse Announced

image

 

Microsoft Touch Mouse is the new multitouch mouse for Windows 7 that will let you click, flick, scroll and swipe so it’s easy and fun to interact with your PC.

Designed to enhance your Windows 7 usage, the Touch Mouse combines the virtues of a mouse with the rich natural language of gesture to offer a more intuitive way to navigate your PC. Touch Mouse also features BlueTrack Technology so you can track virtually anywhere, anytime.1

Top Features and Benefits

· New! Multitouch surface lets you use natural gestures to snap, navigate and control content with a touch of a finger.

· New! Flick scrolling functionality lets you quickly scroll and pan through windows and documents.

· New! Improved task switching on Windows 7 gives you superior mouse performance and experience on the PC.

· BlueTrack Technology allows you to ditch your mouse pad and mouse on virtually any surface,1 including granite, marble, carpet and wood.

· Snap-in Nano transceiver gives you the option to leave the transceiver plugged into the computer or conveniently store it in the bottom of the mouse.

· 2.4GHz wireless technology gives you a confident wireless connection.

· Ambidextrous design for use with either hand.

See the Difference

Touch Mouse Gestures — Easy as 1, 2, 3

Touch Mouse lets you do everything you’re used to doing with a mouse, such as point and click, but also adds gestures with one, two or three fingers to amplify the Windows 7 operating system by creating simple shortcuts to the tasks you want to do most. clip_image002

Shorter Shortcuts for Windows 7

With the Touch Mouse, you can use your mouse to do tasks that normally involve the keyboard.

clip_image004

Availability and Pricing

Touch Mouse will be available in June 2011 for the estimated retail price of $79.95 (U.S.).2 It will be available for presale starting today at Amazon.com and the Microsoft Store online.

Touch Mouse is backed by a worldwide three-year limited hardware warranty. The limited warranty and license agreement are available at http://www.microsoft.com/hardware/warranty.

Some information in this fact sheet relates to pre-release products, which may be substantially modified before they are commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.

1 BlueTrack Technology does not work on clear glass or mirrored surfaces.

2 Estimated retail price. Actual retail price may vary.

 

Technorati Tags:

Data Encryption Toolkit for Mobile PCs

Get tested guidance and powerful tools to help you protect your organization’s most vulnerable data. The strategies outlined in this toolkit are easy to understand, and the guidance shows you how to optimize two key encryption technologies already available to you in Windows XP, Windows Vista, or Windows 7: the Encrypting File System (EFS) and BitLocker Drive Encryption.

Click here

Technorati Tags:

Data Security in Windows Azure

Data Security in Windows Azure: Part 1
Explore the various methods and tools for securing your application data in Windows Azure including methods for securing Azure Storage accounts and data during the transition to the cloud. This video also covers protocols for securing requests to, and responses from, Azure Storage, platform-provided methods for ensuring data integrity, and cryptographic pubic key distribution between Azure roles and Azure Fabric Controller.

Data Security in Windows Azure: Part 2
Learn how to make your Azure Storage container and blob items URL-addressable in a secure fashion, including the setup of permission structure on the URLs, generating hashes to secure individual items and containers, expiration and revocation of storage hashes and keys, and auditing access to the store.

How to Configure SQL Azure Security
Familiarize yourself with security within SQL Azure with demonstrations on the creation of logins, databases and users and information about sys.sql_logins and sys.databases, which allow the display of logins and databases from the master database

How to Configure the SQL Azure Firewall
The Microsoft SQL Azure service prevents access to your SQL Azure server with the SQL Azure firewall. You can use the SQL Azure portal or master database to review and edit your firewall configuration. This topic describes how you can define firewall settings to specify which clients should have access to your SQL Azure server. For more information, see SQL Azure Firewall.

How to Configure the SQL Azure Firewall
The Microsoft SQL Azure service prevents access to your SQL Azure server with the SQL Azure firewall. You can use the SQL Azure portal or master database to review and edit your firewall configuration. This topic describes how you can define firewall settings to specify which clients should have access to your SQL Azure server. For more information, see SQL Azure Firewall.

Technorati Tags: