• DocumentCode
    833070
  • Title

    Four ways to improve security

  • Author

    Snow, Brian

  • Author_Institution
    US Nat. Security Agency, USA
  • Volume
    3
  • Issue
    3
  • fYear
    2005
  • Firstpage
    65
  • Lastpage
    67
  • Abstract
    How can you tell if an IT security product (or a product that includes security components) can secure your application? How can you be certain that a product will fully deliver on its claims that it will protect against malice in a deployed environment? Unfortunately, few vendors - and even fewer customers - can make these judgments. The article won´t make you a security wizard, but it will give you a feel for what to look for in, and when to be concerned about, a vendor´s claims. To ensure that a product has a chance of being secure; customers should check that vendors use adequate approaches in four primary areas. In order of importance (and maturity and availability), they are: quality-control (QC) mechanisms; cryptographic primitives; hardware assist mechanisms; and separation mechanisms.
  • Keywords
    quality control; security of data; IT security product; cryptographic primitives; hardware assist mechanisms; quality-control mechanisms; separation mechanisms; ANSI standards; Computer security; Cryptographic protocols; Digital signatures; Elliptic curve cryptography; Hardware; Information security; Privacy; Process design; Robustness; cryptographic primitives; hardware assist; separation mechanisms; software quality-control;
  • fLanguage
    English
  • Journal_Title
    Security & Privacy, IEEE
  • Publisher
    ieee
  • ISSN
    1540-7993
  • Type

    jour

  • DOI
    10.1109/MSP.2005.66
  • Filename
    1439505