skip to main | skip to sidebar

No Tricks

Risk, Security, Math, Crypto

Saturday, February 27, 2010

Month Summary, Feb 2010

A quick summary of this month’s posts

Security

  • A Short Security Manifesto
  • A dissection of Koobface
  • Simplified implementation of the Microsoft SDL
  • FSA Security Controls for protecting Customer Data...
  • How to write an Information Security Policy
  • The USB Password Vulnerability
  • Fast computations on FPGA Clusters

SSL

  • Why use SSL?
  • How to Render SSL Useless
  • Plugging the Authentication Gap in SSL

Risk

  • Six Myths in Assessing Risk
  • AON 2010 Political Risk Map
  • An Anonymity computation using R
  • Major Risks in the IT Industry
  • Metrics for Managing Project Risk

Visualization

  • When to use Pie Charts
  • AON 2010 Political Risk Map
  • NodeXL: Network Overview, Discovery and Exploratio...
  • A dissection of Koobface

Other

  • Get your Faraday Bag
  • Single DES and Double Yolks
  • Another source of USB Randomness
  • Lew's Law: IT expenses converge to the cost of ele...
  • A look back, Jan – Feb 2009
Bookmark and Share
Posted by Unknown at 4:20 AM
Labels: roundup

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

Unknown
View my complete profile

Quick Links

  • Home
  • Luke O'Connor Bio
  • Top Posts
  • Favourite Posts
  • Scribd Collections
  • The No Tricks Name

Subscribe

Posts
Atom
Posts
Comments
Atom
Comments

ALL POSTS

  • on AES and A5/1
  • on Passwords
  • on the Birthday Paradox
  • on Entropy
  • with FreeMind outlines

Search This Blog

Blog Archive

  • ►  2013 (3)
    • ►  April (2)
    • ►  February (1)
  • ►  2012 (2)
    • ►  May (2)
  • ►  2011 (32)
    • ►  October (4)
    • ►  September (13)
    • ►  August (5)
    • ►  June (2)
    • ►  May (1)
    • ►  April (2)
    • ►  March (4)
    • ►  January (1)
  • ▼  2010 (116)
    • ►  December (7)
    • ►  October (1)
    • ►  September (7)
    • ►  August (14)
    • ►  June (1)
    • ►  May (38)
    • ►  April (7)
    • ►  March (15)
    • ▼  February (24)
      • Month Summary, Feb 2010
      • A look back, Jan – Feb 2009
      • A Short Security Manifesto
      • USB devices back on duty for the DoD
      • NodeXL: Network Overview, Discovery and Exploratio...
      • A dissection of Koobface
      • Major Risks in the IT Industry
      • Metrics for Managing Project Risk
      • Simplified implementation of the Microsoft SDL
      • Why use SSL?
      • When to use Pie Charts
      • Lew's Law: IT expenses converge to the cost of ele...
      • An Anonymity computation using R
      • FSA Security Controls for protecting Customer Data
      • How to write an Information Security Policy
      • Six Myths in Assessing Risk
      • AON 2010 Political Risk Map
      • Another source of USB Randomness
      • How to Render SSL Useless
      • Get your Faraday Bag
      • Single DES and Double Yolks
      • The USB Password Vulnerability
      • Plugging the Authentication Gap in SSL
      • Fast computations on FPGA Clusters
    • ►  January (2)
  • ►  2009 (111)
    • ►  December (9)
    • ►  November (26)
    • ►  October (3)
    • ►  September (6)
    • ►  August (3)
    • ►  July (3)
    • ►  June (13)
    • ►  May (9)
    • ►  April (11)
    • ►  March (9)
    • ►  February (5)
    • ►  January (14)
  • ►  2008 (25)
    • ►  December (7)
    • ►  November (3)
    • ►  October (2)
    • ►  August (3)
    • ►  July (3)
    • ►  June (3)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2007 (2)
    • ►  October (1)
    • ►  September (1)

Lijit Search

Lijit Search

Labels

  • A5/1 (7)
  • AES (9)
  • Analysis (3)
  • Anonymity (7)
  • AV (4)
  • Awareness (3)
  • Biometric (2)
  • Birthday Paradox (5)
  • Black Swan (11)
  • Block Cipher (1)
  • Blogging (15)
  • Books (5)
  • Border Search (1)
  • BP (1)
  • Browser (4)
  • Bruce (3)
  • Brute Force (2)
  • Buffer Overflow (1)
  • Business Insider (1)
  • business models (1)
  • CAPTCHA (2)
  • Certificates (1)
  • Charting (2)
  • Choice (1)
  • Chrome (1)
  • CISO (1)
  • cloud computing (11)
  • coincidences (2)
  • Cold Boot (2)
  • Conficker (4)
  • controls (1)
  • Course (2)
  • cryptography (10)
  • Data (5)
  • Data Breach (4)
  • Data Center (1)
  • Data Centric Security (4)
  • DDoS (1)
  • DES (1)
  • DNS (3)
  • DoD (1)
  • education (2)
  • Elliptic Curves (1)
  • Email (2)
  • Encrypted search (4)
  • Encryption (14)
  • ENISA (3)
  • Entropy (7)
  • Estimation (1)
  • Excel (2)
  • Facebook (4)
  • Factoring (3)
  • faraday (2)
  • Fault Injection (2)
  • Fibonnaci (1)
  • FireFox (1)
  • framework (1)
  • FreeMind (6)
  • FSA (1)
  • FUD (2)
  • Gambling (1)
  • games (1)
  • Google (6)
  • GPS (3)
  • GPU (1)
  • Green IT (1)
  • GSM (3)
  • Half Life (2)
  • Hashing (2)
  • HP (1)
  • Humour (6)
  • IBM (6)
  • ICANN (2)
  • IE (2)
  • IEEE (1)
  • IEP (2)
  • Infographic (3)
  • Interesting (4)
  • iPad (1)
  • iPhone (1)
  • ISACA (2)
  • IT (1)
  • IT Risk (3)
  • Key Lengths (3)
  • Key Management (1)
  • Koobface (1)
  • Language (1)
  • Long Tail (3)
  • Lottery (1)
  • Malware (4)
  • Metrics (1)
  • microsoft (5)
  • Mind mapping (6)
  • Natural Catastrophe (2)
  • New School of Information Security (1)
  • NIST (3)
  • NodeXL (1)
  • NSA (1)
  • One Way Hash Arguments (1)
  • Online transactions (1)
  • Open Source (2)
  • OWASP (3)
  • P2P (1)
  • PageRank (3)
  • Passwords (28)
  • phishing (1)
  • PKI (2)
  • policy (1)
  • Power Laws (4)
  • PowerPoint (2)
  • Predictions (2)
  • Presentation (6)
  • Prezi (1)
  • Privacy (5)
  • Probability (4)
  • Project Risk (1)
  • Quantitative (2)
  • Quantum Computing (2)
  • quantum cryptography (1)
  • R Programming Language (1)
  • Rainbow Tables (4)
  • Random Graph Theory (1)
  • Randomness (5)
  • RC4 (2)
  • re-keying (1)
  • Redundancy (1)
  • renegotiation attack (3)
  • Reputational Damage (1)
  • Research (1)
  • Retrospective (6)
  • RFID (2)
  • Risk Factors (6)
  • Risk Management (20)
  • roundup (3)
  • RSA (5)
  • Satellites (2)
  • Scenario Driven Risk Analysis (1)
  • scribd (20)
  • SDL (2)
  • Security (38)
  • Security Management (1)
  • Skype (1)
  • Social Engineering (1)
  • Social Media (3)
  • SOX (1)
  • Spam (2)
  • Spreadsheet (1)
  • SSD (1)
  • ssl (8)
  • Star Wars (2)
  • statistical tests (1)
  • Statistics (2)
  • SUN (1)
  • TED (1)
  • Threat Modeling (4)
  • Tipping Point (1)
  • TLS (3)
  • TMTO (2)
  • ToR (2)
  • Trends (2)
  • trojan (1)
  • Turing (1)
  • Twitter (7)
  • uncertainty (1)
  • USB (7)
  • VaR (1)
  • VeriSign (1)
  • Video (1)
  • Visualization (21)
  • Vulnerabilities (2)
  • Weapons of Math Instruction (1)
  • web 2.0 (9)
  • Whit Diffie (2)
  • Whitelisting (3)
  • whitepaper (2)
  • Wikileaks (1)
  • Windows (1)
  • Wireless (2)
  • Wisdom of Crowds (2)
  • Worm (1)
  • WPA (1)
  • X509 (1)
  • YouTube (1)
  • Zero Knowledge Proof (1)
 

Apture