Introduction to Cryptography and Physical Security Applications

Introduction to Cryptography and Physical Security Applications

April 12, 2018, 2:30 PM - 3:30 PM

Sands 305 Level 1

Language:
English

Security practitioners rely on vendor and service provider solutions to keep their assets, operations and people safe. Access control configurations and features are only part of the equation. Application and infrastructure security and their integrity rely on encryption.

While the most associate encryption with credentials, the truth is that every component in physical access depends on encryption for its own security. Whether it's transparent or deliberate, how its executed has enormous impact on security objectives at all levels - it can even undermine otherwise great product designs.

Unfortunately, the physical access industry has a long history weak encryption implementation and too often flawed designs. This presentation will provide attendees with fundamentals of how encryption works, where it's applied, and how to assess an implementations cryptographic design quality. Also reviewed are key considerations to supporting various methods and how certain implementations can be compromised.

Learning Objectives:
1. Fundamentals of how cryptography works and physical access challenges
2. Understand how to differentiate types and implementations in physical access
3. Be able to determine “better practice” vs. “common practices” used in physical security
4. Physical access weaknesses and mitigation strategy

Contributors

  • Jason Hart

    Presenter

    CEO

    Safetrust Inc

    Mr. Jason Hart is a co-founder and Chief Executive Officer of SafeTrust Inc, which delivers identity credentials for physical access systems,...

Show

  1. Show SIA Education@ISC

Categories

  1. Track
    Connected Security Technology

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.