Category: "Security Engineering"

About the Security Engineering category

  22:47, by Hagai Bar-El   , 49 words
Categories: Security Engineering

The Security Engineering category contains articles that discuss analysis of requirements and solutions that are of interest to the security engineer. As opposed to the IT Security category, the articles of this category address not the secure deployment of systems, but the secure design of systems -- software and hardware.

Pages: 1 2 4


The iPhone Hack -- Security Done Wrong or Security Done Right?

  22:06, by Hagai Bar-El   , 552 words
Categories: Security Engineering, Counter-media
A while ago the iPhone was hacked so to make it usable on networks other than AT&T's. Since that moment, many opinions were sounded on how Apple could have done their security better and how the hack could have been eliminated. Moreover, some of… more »


File Wiping and Disk-on-Key

  21:57, by Hagai Bar-El   , 522 words
Categories: Security Engineering
Most vendors selling security software that deals with removable devices or with flash storage mediums such as Disk-On-Key (DoK) provide the functionality of file wiping (often called shredding) from the removable medium. This feature allows the user to… more »


Rights Management Systems Versus "Simple" Data Encryption

  21:47, by Hagai Bar-El   , 156 words
Categories: Security Engineering
Here is a question that was raised in a discussion forum, along with my response to it. I figured it is interesting enough to post it here. Question: Why not just deploy a Enterprise Right Management solution instead of using various encryption tools to… more »


The toughest part of designing secure products

  21:37, by Hagai Bar-El   , 928 words
Categories: Security Engineering
It is already obvious that security is hard to do right. Bruce Schneier has written a good essay called: Why Cryptography Is Harder Than It Looks. This essay refers to cryptography, but touches on the subject as a whole. It is still not always clear,… more »


Watermarking for DRM? Maybe one day

  21:16, by Hagai Bar-El   , 228 words
Categories: Security Engineering
One of the biggest hurdles of DRM results is that content can somehow be leaked by a few skilled individuals and then find itself on the peer-to-peer networks again. The only way to mitigate this threat is by embedding a watermark on the plain content d… more »

1 2 4