Главная
Study mode:
on
1
Intro
2
Program Agenda
3
Making the JDK More Secure
4
Java Security Components
5
Making the DK Secure by Default
6
Cryptographic Roadmap
7
Disable SHA-1 Certificates
8
Enable Unlimited Cryptographic Policy By Default
9
Configuring the Restrictions
10
Default Restrictions
11
Restrictions Example
12
JDK 9 Security Features
13
Create PKCS12 Keystores by Default
14
Leverage CPU Instructions for GHASH and RSA
15
DRBG-Based Secure Random Implementations
16
OCSP Stapling for TLS
17
TLS Application Layer Protocol Negotiation Extension
18
Datagram Transport Layer Security (DTLS)
19
Other Module System Security Features
20
Conclusion
Description:
Explore how Oracle is enhancing JDK security in this 44-minute conference talk by Sean Mullan. Discover new JDK 9 security features, including SHA-3, OCSP stapling, DTLS, and DRBG SecureRandom. Learn about the default security configuration that protects applications from weak cryptographic algorithms and the disabling of SHA-1 certificates. Understand the cryptographic roadmap, Java security components, and the implementation of unlimited cryptographic policy by default. Gain insights into PKCS12 keystores, CPU instructions for GHASH and RSA, and TLS Application Layer Protocol Negotiation Extension. Examine the module system security features and their impact on Java application security in today's internet-connected world.

Making the JDK More Secure - New Features and Default Configuration

Java
Add to list
0:00 / 0:00