Categories: "Analysis"

About the Analysis category

  03:20, by Hagai Bar-El   , 48 words
Categories: Analysis

The Analysis category contains articles that discuss security analysis of requirements and analysis of solutions. This category is further divided into sub-categories that address cybersecurity (critical infrastructure and homeland security), IT security (deployment of IT security tools and operations), security engineering (the development of security tools), and policy.

Pages: 1 2 3 ...4 ... 6 ...8 ...9 10 11 12


The case for supporting one-time passwords in conjunction with regular ones

  23:42, by Hagai Bar-El   , 874 words
Categories: IT Security
A few days ago I got a Yubikey. While exploring use-cases for it, it occurred to me that there is a strong case for a mode of operation which is seldom (never?) used by IT departments: using the token while also supporting static passwords for the same… more »


Handling the Security Aspect of Smart Grid Product Purchasing

  23:33, by Hagai Bar-El   , 1581 words
Categories: Security Engineering, Cyber Security
Smart Grid security is one of the new emerging fields of security. Everybody knows that the new generation of electricity grids requires a new level of security against cyber-wars, cyber-terrorism, and all the rest. Yet, for the purchaser of Smart Grid… more »


The Difference Between Content Protection and Cyber Security

  23:32, by Hagai Bar-El   , 1156 words
Categories: Security Engineering
A few days ago I was presented with an interesting question: What is the difference between Content Protection and Cyber Security? These domains of Information Security are so different and unrelated, that the difference in their definition is more or… more »


CAcert as a certification alternative

  23:31, by Hagai Bar-El   , 1011 words
Categories: IT Security, Counter-media
A few months ago, I wrote about the problem that emerges from having to rely on digital certificates that are issued by Certification Authorities of which we, the relying parties, are not the paying customers. As a result, we rely on the CA… more »


Understanding the Impact of the RSA SecurID Breach

  23:25, by Hagai Bar-El   , 849 words
Categories: IT Security
A few days ago, we were notified (e.g., here and here) that a hack into the network of RSA Security (the security division of EMC) has led to someone stealing something that is related to the SecurID token product. We cannot determine the real impact of… more »


The Future of Content Protection on Open Platforms, Such as Android

  23:20, by Hagai Bar-El   , 824 words
Categories: Security Engineering
The emergence of the Android Operating System for mobile devices is said to have put the content protection industry in trouble. This is probably true. However, for sake of accuracy, it has not introduced wholly new problems as it worsened existing… more »


Tips for Submitting Proposals to EU FP7 (now H2020) and Others

  23:09, by Hagai Bar-El   , 994 words
Categories: Security Policies
Among the work I do is the evaluation of research proposals for the FP7 (and H2020) of the European Commission. I review research proposals that are submitted in response to calls that are related to information security. Truthfully, this work… more »

1 2 3 ...4 ... 6 ...8 ...9 10 11 12