SlideShare une entreprise Scribd logo
1  sur  32
IT346 Information
System Security
Week 5-1: PKI

Faculty of Information Technology

Page
Digital Certificate
Secret Key



Key
Distribution Center)

Public Key

Authority (CA)

Public Key
Key

CA
‣
‣
Faculty of Information Technology

CA

Key
KDC (Key

Certificate

CA

Public

CA

(Digital Certificate)

Page

2
Digital Certificate
 Digital Certificate

Public Key
Digital Certificate

Digital Signature
Owner’s Info

CA

Owner’s public key

Issuer’s Info



Issuer’s signature

Certificate
Faculty of Information Technology

Public Key
Digital Certificate
Digital
Page

3
Public Key
Infrastructure (PKI)

public key cryptosystem

public/private

key pair

certificate
Trusted
Third Party (TTP)
public/private key pair
identity
certificate
certificate
public
key
certificate

TTP
sign
certificate
Subjec Public Expiratio
…
TTP
private key
TTP Issuer
t ID

Faculty of Information Technology

Key

n Date
(TTP ID)
Certificate Structure

Signature
Page

4
Public Key
Infrastructure (PKI)
 Certificate Authority (CA)
TTP
certificate



CA 1

certificate

CA
verify certificate
public key
CA
CA
(hierarchy)
Public Key Infrastructure (PKI)
‣

CA
‣
Faculty of Information Technology

Root CA

certificate

public key

Root
Page

5
Public Key
Infrastructure (PKI)
Root
CertC
A1
CA PKC Sigr CA
1
A1
oot
1
CertAl
ice
Alic PKA Sig
lice
CA1
e

CA

CertC
CA PKC Sigr
CA A2
A2
oot
2
2
CertC
CA2
CA2 A2.2 PKC SigC
CA
.1 Cert
.2
A2
2.2 A2.2
ob
Bob

B

PKB SigC
ob

A2.2

 Alice  Bob: message || CertAlice || CertCA1
 Bob  Alice: message || CertBob || CertCA2.2 || CertCA2

tree
certificate
CA

certificate
CA
hash
certificate
Faculty of Information Technology

copy

CA

certificate
Page

6
Certificate
Certificate



(Authentication)
(Encryption)
‣ Web Site Certificate:

secure connection
Certificate
Faculty of Information Technology

Server
Page
Certificates
Windows

 Internet Explorer (IE)

Certificates
Applications
‣

Microsoft

Certificates
IE
Tools  Internet Options

Faculty of Information Technology

Page


Certificates
Windows

Trusted Root CA
Certificate
Root CA
‣

Certificate
Web Site
Sign
Web Site

Root CA
Web Site

 CA
‣ Verisign
‣ GeoTrust
‣ Thawte Consulting
Faculty of Information Technology

Page

9
Certificates
Windows
Certificate
IE



Certificate
IE
Certificate
Web Site Certificate

‣

Certificate

IE

Certificate
‣
Faculty of Information Technology

Certificate

IE

CA
Page

10
Revocation List
(CRL)

Certificate

(Revoke) Certificate

‣ Certificate
‣
Certificate
‣

 CA
Faculty of Information Technology

Private Key
Certificate
Private Key
Private Key
Certificate

Certificate Revocation
Page
X.509
 X.509

ITU-T (International
Telecommunication Union –
Telecommunication Standardization
Sector)
Public Key Infrastructure
(PKI)
‣

Certificate,
Revocation List,
Certificate

Faculty of Information Technology

PKI
Certificate

Page

12
X.509 Certificate
X.509
Version 3

certificate
CA

Sign Certificate

CA
Certificate

Sign
Certificate
Certificate
Public Key
Key
Pubic Key

CA

Certificate

Hash
Private Key
CA
Certificate
CA
Hash

Faculty of Information Technology

Page

13
X.509 PKI
Root
CA
Cert CA
CA1
1
CA2
.1

Cert
Alice

Cert

CA
2

CA2

CA2 CertC
A2.2
.2
Cert

 X.509

‣

Faculty of Information Technology

Root CA

PKI

Bob

PKI
Root CA

Page

14
X.509 Certification
Signature Chain
Certificate



CA<<Subject>>

CA
Certificate
Subject
‣ Cathy<<Alice>>

Alice
‣ Dan<<Bob>> Dan
Bob

Faculty of Information Technology

CA 2

Cathy

Certificate

Certificate

cross-certified
CA
Page

15
X.509 Certification
Signature Chain


Certification Signature
Chain
trust
cross-certified
CA
Alice
Cathy
Alice
certificate signature chain
Bob
Cathy<<Dan>> Dan<<Bob>>

‣

• Alice

Dan
Alice

Faculty of Information Technology

Dan

Certificate

Cathy

Cathy
Bob

Bob
Certificate
Page

16
X.509 Certification
Signature Chain
‣

Bob
Dan
Bob
certificate signature chain
Alice
Dan<<Cathy>> Cathy<<Alice>>
• Bob

Certificate
Alice
Cathy
Certificate
Cathy
Dan
Bob
Dan
Alice

Faculty of Information Technology

Page

17
(User
Authentication)
Faculty of Information Technology

Page

18
(Authentication)



‣ Authentication

“authenticus (αὐθεντικός)”,

,

,

‣ Authentication

‣ Authentication

Security Goal(s)


Faculty of Information Technology

?

(User
Page
Authentication
Process
 Authentication

 Authentication

(access control)
(user accountability)

Faculty of Information Technology

Page

20
Authentication
Process
 Identification =
‣

‣ Identity

service

:

(identifier)
access control

security

 Verification =
‣

(authentication information)
Faculty of Information Technology

Page

21
User VS Message
Authentication
 Message Authentication
‣

 User Authentication
‣

identity

Faculty of Information Technology

Page

22
: User
Authentication
identity

Faculty of Information Technology

Page

23
Password
Authentication


‣ User

password
(multiuser
systems),
network-based servers,
Web-based e-commerce sites)

‣

name/login

password
login

password

 User ID:
‣
Faculty of Information Technology

Page

24
Password
Vulnerabilities
Offline
diction
ary
attack
Specific
account
attack

Faculty of Information Technology

Popula
r
passwo
rd
attack
Passwo

rd
guessin
g
against
single
user

Workst
ation
hijacki
ng

Exploiti
ng
multipl
e
passwo
rd use

Exploiti
ng user
mistak
es

Electro
nic
monito
ring

Page

25
Password
Vulnerabilities
 Offline dictionary attack:
‣

‣

password file
password hashes

password
match
ID

hash

password

 Specific account attack:
‣
account
password
password
Faculty of Information Technology

Page

26
Password
Vulnerabilities

 Password guessing against single user:
‣ Attacker
password policies
password.
 Workstation hijacking:
‣ Attacker

log-in

 Exploiting multiple password use:
‣ Attack
Faculty of Information Technology

Page

27
Password
Vulnerabilities
 Exploiting user mistakes:

password,

‣

password

‣

‣ Attacker

passwords

user
password

social engineering

account manager

‣
Faculty of Information Technology

Page

28
Password
Vulnerabilities
 Electronic monitoring
‣ Password

log on

remote system
(eavesdropping)

‣ Encryption

encrypted password
password
Attacker

Faculty of Information Technology

Page

29
(Countermeasures)


authentication

password-based

password file
user ID.

password

‣

way hash function
password
 Against offline dictionary attack

one-

‣

password file
‣

detection)
‣
Faculty of Information Technology

(intrusion

password
compromised passwords
Page

30
(Countermeasures)
 Against popular password attack
‣ Policies

password

‣ Scan

IP addresses
authentication requests
cookies
client
pattern
password

 Against password guessing against

single user
‣
‣ policies

,

Faculty of Information Technology

password policies
password
password, set

,
Page

31
(Countermeasures)

 Against exploiting user mistakes
‣
,
intrusion detection
‣
passwords
authentication
 Against exploiting multiple password

use

‣ policies

password
network device

 Against electronic monitoring
‣
Replay Attack
Faculty of Information Technology

Page

32

Contenu connexe

En vedette

Information system security wk6-1
Information system security wk6-1Information system security wk6-1
Information system security wk6-1Bee Lalita
 
Information system security wk4-2
Information system security wk4-2Information system security wk4-2
Information system security wk4-2Bee Lalita
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSCAdv Prashant Mali
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 

En vedette (9)

network security
network securitynetwork security
network security
 
Information system security wk6-1
Information system security wk6-1Information system security wk6-1
Information system security wk6-1
 
Information system security wk4-2
Information system security wk4-2Information system security wk4-2
Information system security wk4-2
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Security
SecuritySecurity
Security
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 

Similaire à Information system security wk5-1-pki

Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsUlf Mattsson
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthnFIDO Alliance
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpointCourtney King
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresOliver Pfaff
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Alliance
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Alliance
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance
 
WebAuthn and Security Keys
WebAuthn and Security KeysWebAuthn and Security Keys
WebAuthn and Security KeysFIDO Alliance
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUlf Mattsson
 
ID連携入門 (実習編) - Security Camp 2016
ID連携入門 (実習編) - Security Camp 2016ID連携入門 (実習編) - Security Camp 2016
ID連携入門 (実習編) - Security Camp 2016Nov Matake
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Adam Pennington
 
(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using Things
(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using Things(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using Things
(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using ThingsAmazon Web Services
 
Jarrar.lecture notes.aai.2011s.ontology part5_egovernmentcasestudy
Jarrar.lecture notes.aai.2011s.ontology part5_egovernmentcasestudyJarrar.lecture notes.aai.2011s.ontology part5_egovernmentcasestudy
Jarrar.lecture notes.aai.2011s.ontology part5_egovernmentcasestudyPalGov
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lectureynamoto
 
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...Microsoft Technet France
 
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...Microsoft Décideurs IT
 
Blockchain: the trust fabric for next generation digital identity management
Blockchain: the trust fabric for next generation  digital identity managementBlockchain: the trust fabric for next generation  digital identity management
Blockchain: the trust fabric for next generation digital identity managementEY
 

Similaire à Information system security wk5-1-pki (20)

Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
Getting Started With WebAuthn
Getting Started With WebAuthnGetting Started With WebAuthn
Getting Started With WebAuthn
 
March cybersecurity powerpoint
March cybersecurity powerpointMarch cybersecurity powerpoint
March cybersecurity powerpoint
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview
 
FIDO Technical Specifications Overview
FIDO Technical Specifications OverviewFIDO Technical Specifications Overview
FIDO Technical Specifications Overview
 
FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016FIDO Alliance: Year in Review Webinar slides from January 20 2016
FIDO Alliance: Year in Review Webinar slides from January 20 2016
 
WebAuthn and Security Keys
WebAuthn and Security KeysWebAuthn and Security Keys
WebAuthn and Security Keys
 
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENTUNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
 
ID連携入門 (実習編) - Security Camp 2016
ID連携入門 (実習編) - Security Camp 2016ID連携入門 (実習編) - Security Camp 2016
ID連携入門 (実習編) - Security Camp 2016
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
 
(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using Things
(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using Things(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using Things
(MBL311) NEW! AWS IoT: Securely Building, Provisioning, & Using Things
 
Jarrar.lecture notes.aai.2011s.ontology part5_egovernmentcasestudy
Jarrar.lecture notes.aai.2011s.ontology part5_egovernmentcasestudyJarrar.lecture notes.aai.2011s.ontology part5_egovernmentcasestudy
Jarrar.lecture notes.aai.2011s.ontology part5_egovernmentcasestudy
 
Blockchain & microsoft
Blockchain & microsoftBlockchain & microsoft
Blockchain & microsoft
 
Ynamono Hs Lecture
Ynamono Hs LectureYnamono Hs Lecture
Ynamono Hs Lecture
 
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
 
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
Les mécanismes et protocoles d’authentification sans mot de passe avec Window...
 
An Online secure ePassport Protocol
An Online secure ePassport ProtocolAn Online secure ePassport Protocol
An Online secure ePassport Protocol
 
Blockchain: the trust fabric for next generation digital identity management
Blockchain: the trust fabric for next generation  digital identity managementBlockchain: the trust fabric for next generation  digital identity management
Blockchain: the trust fabric for next generation digital identity management
 
Security
SecuritySecurity
Security
 

Plus de Bee Lalita

Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsBee Lalita
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2Bee Lalita
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pkiBee Lalita
 
Information system security wk4-cryptography-2
Information system security wk4-cryptography-2Information system security wk4-cryptography-2
Information system security wk4-cryptography-2Bee Lalita
 
Information system security wk4-cryptography-2
Information system security wk4-cryptography-2Information system security wk4-cryptography-2
Information system security wk4-cryptography-2Bee Lalita
 
Information system security it346 wk4-1
Information system security it346 wk4-1Information system security it346 wk4-1
Information system security it346 wk4-1Bee Lalita
 
Information system security wk4-1
Information system security wk4-1Information system security wk4-1
Information system security wk4-1Bee Lalita
 
Information system security wk3-2
Information system security wk3-2Information system security wk3-2
Information system security wk3-2Bee Lalita
 
Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Bee Lalita
 
Information system security wk1-1
Information system security wk1-1Information system security wk1-1
Information system security wk1-1Bee Lalita
 
Information system security wk3-1
Information system security wk3-1Information system security wk3-1
Information system security wk3-1Bee Lalita
 

Plus de Bee Lalita (11)

Information system security wk7-1-ids-ips
Information system security wk7-1-ids-ipsInformation system security wk7-1-ids-ips
Information system security wk7-1-ids-ips
 
Information system security wk6-2
Information system security wk6-2Information system security wk6-2
Information system security wk6-2
 
Information system security wk5-1-pki
Information system security wk5-1-pkiInformation system security wk5-1-pki
Information system security wk5-1-pki
 
Information system security wk4-cryptography-2
Information system security wk4-cryptography-2Information system security wk4-cryptography-2
Information system security wk4-cryptography-2
 
Information system security wk4-cryptography-2
Information system security wk4-cryptography-2Information system security wk4-cryptography-2
Information system security wk4-cryptography-2
 
Information system security it346 wk4-1
Information system security it346 wk4-1Information system security it346 wk4-1
Information system security it346 wk4-1
 
Information system security wk4-1
Information system security wk4-1Information system security wk4-1
Information system security wk4-1
 
Information system security wk3-2
Information system security wk3-2Information system security wk3-2
Information system security wk3-2
 
Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2Information system security wk7-2-ids-ips_2
Information system security wk7-2-ids-ips_2
 
Information system security wk1-1
Information system security wk1-1Information system security wk1-1
Information system security wk1-1
 
Information system security wk3-1
Information system security wk3-1Information system security wk3-1
Information system security wk3-1
 

Dernier

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Information system security wk5-1-pki