security : Java Glossary

security

Java has features to prevent Applets downloaded off the web from doing any deliberate damage. It also has features to prevent ordinary applications from inadvertently doing damage. One other aspect of security are digital signatures so that you can ensure an Applet came unmodified from a reputable source.

There are many digital signing and encryption protocols. Here is a summary based on a table on page 218 of Web Security & Commerce.

book cover recommend book⇒Web Security, Privacy and Commerce, second editionto book home
by Simson Garfinkel 978-0-596-00045-5 paperback
publisher O’Reilly recommended 978-1-4493-0524-6 eBook
published 2002-01-15 B004V9MQZS kindle
Good for overview, not practical detail. The shark book.
Australian flag abe books anz abe books.co.uk UK flag
Chinese flag amazon.cn amazon.co.uk UK flag
German flag abe books.de abe books.ca Canadian flag
German flag amazon.de amazon.ca Canadian flag
Spanish flag amazon.es Chapters Indigo Canadian flag
Spanish flag iberlibro.com abe books.com American flag
French flag abe books.fr amazon.com American flag
French flag amazon.fr Barnes & Noble American flag
Italian flag abe books.it Google play American flag
Italian flag amazon.it O’Reilly Safari American flag
India flag junglee.com Powells American flag
UN flag Kobo other stores UN flag
Greyed out stores probably do not have the item in stock. Try looking for it with a bookfinder.
System What is it? Algorithms Provides
DNSSEC Secure Domain Name System RSA (Rivest, Shamir and Adelman), MD5 (Message Digest algorithm 5) Authentication, integrity
IPsec and IPv6 (Internet Protocol Version 6) Low-level protocol for encrypting IP (Internet Protocol) packets Diffie-Hellman and others Confidentiality (optional), authentication, integrity
JCE (Java Cryptography Extension) API (Application Programming Interface) from Sun RSA (signature and encryption), RC2, RC5, SHA-0, SHA-1 (Secure Hash Algorithm 1), MD5, DES (Data Encryption Standard), ECB (Electronic Codebook mode), CBC (Cipher Block Chaining mode), IDEA, Blowfish, Twofish. Allows Java to encrypt and sign files
Kerberos Network security service for securing higher-level applications DES Email passwords, Telnet logins, Confidentiality, authentication
PCT (Private Communication Technology) Protocol for encrypting TCP (Transmission Control Protocol), IP transmissions. RSA, MDS, RCZ, RC4, and others Confidentiality, authentication, integrity, nonrepudiation
PGP (Pretty Good Privacy) Application program for encrypting electronic mail IDEA, RSA, MD5 Email signing and encryption, File encryption, Confidentiality, authentication, integrity, nonrepudiation
S-HTTP Protocol for encrypting HTTP (Hypertext Transfer Protocol) requests and responses RSA, DES, and others Confidentiality, authentication, integrity, nonrepudiation; however, it’s obsolete
S/MIME (Secure Multipurpose Internet Mail Exchange) Format for encrypting electronic mail User-specified E-mail signing and encryption, Confidentiality, authentication, integrity, nonrepudiation
SET and CyberCash Protocols for sending secure payment instructions over the Internet RSA, MDS, RC2 Confidentiality of credit card numbers, but nothing else; integrity of entire message; authentication of buyer and seller; nonrepudiation of transactions
SSH (Secure Shell) Encrypted remote terminal RSA, Diffie-Hellman, DES, Triple-DES, Blowfish, and others Telnet encryption and login, Confidentiality, authentication
SSL (Secure Sockets Layer) v3 Protocol for encrypting TCP/IP (Transmission Control Protocol/Internet Protocol) transmissions RSA, RCZ, RC4, MD5, and others Website commerce, compression, Confidentiality, authentication, integrity, nonrepudiation
TLS (Transport Layer Security) 1 Protocol for encrypting TCP/IP transmissions a 128-bit improvement on SSL v3. Handles all the SSL v3 protocols including RSA, RCZ, RC4 and MD5. Opera browser, Website commerce, compression, Confidentiality, authentication, integrity, nonrepudiation
Asymmetric Key Uses private and public keys for encryption and signing RSA, DSA (Digital Signature Algorithm) and DiffieHellman Code signing, encryption, authentication. DSA is the DSA, not used for encryption.
Symmetric Key Uses only secret keys for encryption. DES, Blowfish, TripleDES encryption, authentication. Same key used for encryption must be used for decryption.
You can browser for security at Symantec Find out for example if your browser is secretly blabbing your email address to every website it visits.

Your Java security is only as good as the OS (Operating System) security backing it up. These two websites will probe your OS for security holes and report them back to you. www.DSLREPORTS.com (pay) and grc.com (free). When I ran the GRC (Gibson Research Corporation) ’s report my hair stood on end about all the information NT was blabbing to the universe without my permission.

Windows NT/2000 has over 1000 known security holes. There are ways of plugging some of them. Stat is a tool for managing this giant piece of Swiss cheese.

Books

book cover recommend book⇒The CERT Oracle Secure Coding Standard for Javato book home
by Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda 978-0-321-80395-5 paperback
publisher Addison-Wesley Professional 978-0-13-288285-9 eBook
published 2011-09-18 B005LVNX5W kindle
(SEI Series in Software Engineering) The CERT Oracle Secure Coding Standard for Java provides rules designed to eliminate insecure coding practices that can lead to exploitable vulnerabilities. Application of the standard’s guidelines will lead to higher-quality systems — robust systems that are more resistant to attack. Such guidelines are required for the wide range of products coded in Java — for devices such as PCs, game players, mobile phones, home appliances, and automotive electronics.
Australian flag abe books anz abe books.co.uk UK flag
Chinese flag amazon.cn amazon.co.uk UK flag
German flag abe books.de abe books.ca Canadian flag
German flag amazon.de amazon.ca Canadian flag
Spanish flag amazon.es Chapters Indigo Canadian flag
Spanish flag iberlibro.com abe books.com American flag
French flag abe books.fr amazon.com American flag
French flag amazon.fr Barnes & Noble American flag
Italian flag abe books.it Google play American flag
Italian flag amazon.it O’Reilly Safari American flag
India flag junglee.com Powells American flag
UN flag Kobo other stores UN flag

Learning More



available on the web at:

http://mindprod.com/jgloss/security.html
ClustrMaps is down

optional Replicator mirror
of mindprod.com
on local hard disk J:

J:\mindprod\jgloss\security.html
logo
Please the feedback from other visitors, or your own feedback about the site.
Contact Roedy.
Blog
IP:[65.110.21.43]
Your face IP:[54.204.215.209]
You are visitor number 19,568.