Главная
Study mode:
on
1
Intro
2
Supplemental Materials
3
What This Talk Is
4
What We Will Cover
5
What is Cryptography?
6
Examples of Cryptography
7
Random Numbers
8
HashMessage Authentication Codes - HMAC
9
Secure Password Storage
10
Symmetric Encryption - AES
11
Asymmetric Encryption - RSA
12
Digital Signatures
13
Quick Recap
14
Hybrid Encryption - Integrity
15
Hybrid Encryption - Signature
16
What We Have Covered
17
Further Reading and Support
Description:
Explore essential .NET data security strategies in this 48-minute conference talk from NDC Security 2018. Learn how to protect your employer's data using the .NET Framework, covering confidentiality, integrity, non-repudiation, and authentication. Dive into random number generation, hashing techniques, authenticated hashing, and password-based key derivation functions. Examine symmetric and asymmetric encryption methods, including DES, Triple DES, AES, and RSA. Discover how to combine these elements to create a robust hybrid encryption scheme incorporating AES, RSA, HMACs, and digital signatures. Gain valuable insights from speaker Stephen Haunts on implementing comprehensive data security measures beyond mere hope, ensuring your organization's sensitive information remains protected against potential threats.

.NET Data Security - Hope is Not a Strategy

NDC Conferences
Add to list
0:00 / 0:00