Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
90 Security De-engineering
of other banks, with the transaction encrypted using a shared key
with a network such as Visa, Mastercard, and Cirrus, for example.
e bank may not know it yet (although it probably will), but it has
to maintain a master key for each ATM, plus quite possibly also an
encryption key, authentication key, and keys for all banking networks
for which it is a member.
Banks in general face a huge key management challenge—certainly
ATMs are not their only worry. What about the thousands of online
banking customers who may have been set up with a private certi-
cate as part of a two-factor authentication challenge? What about the
several thousand employees whose passwords may be encrypted with
keys under some Kerberos-ty
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355