Encrypted Chat Program LCO Review Asif Daud & Craig Atkinson.

Slides:



Advertisements
Similar presentations
Instant Messenger Security with a focus on implementing security policies in corporate IM services Kaushal S Chandrashekar CS 691 Dr. Edward Chow UCCS.
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Meganet Corporation VME Office Meganet Corporation Meganet Corporation is a leading worldwide provider of data security to Governments, Military,
Presentation. Contemporary Communication Fast – connects us quickly without delays Reliable – works always Global – connects us with the whole world Low.
Knowledge Pathways in IT
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Implementation of a Two-way Authentication Protocol Using Shared Key with Hash CS265 Sec. 2 David Wang.
Real-Time Authentication Using Digital Signature Schema Marissa Hollingsworth BOISECRYPT ‘09.
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Access Controls Supervised by: Dr.Lo’ai Tawalbeh Prepared by: Abeer Saif.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
IST 221 Internet Concepts and Applications Internet, WWW and HTML 1.
T.A: Viktor Kulikov Eyal Madar Mikael Cohen Spring 2006.
Management Reporter is the replacement of FRx FRx Transition Management Reporter 2012.
Picture Users Making Art Chat An interactive communication tool.
Joining the Future. Superfast Britain – What does this mean for you  High data connection both up and down  Not shared with other people  Business.
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Transfer of data in ICT systems This section covers: Elements of a network Characteristics of a network Communication of data and use of communication.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
System Analysis (Part 2) The System Development Life Cycle Problem Selection and Feasibility Study.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Network Services Networking for Home and Small Businesses – Chapter 6.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
Designing Authentication for a Microsoft Windows 2000 Network Designing Authentication in a Microsoft Windows 2000 Network Designing Kerberos Authentication.
Case Study II: A Web Server CSCI 8710 September 30 th, 2008.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Security in Skype Prepared by Prithula Dhungel. Security in Skype2 The Skype Service P2P based VoIP software Founded by the founders of Kazaa Can be downloaded.
Secure Shell (SSH) Presented By Scott Duckworth April 19, 2007.
Translation Assistance Software Life Cycle Objectives Review Aneesa Awaludin Van Phan Jacob Huston.
Security School of Business Eastern Illinois University © Abdou Illia, Fall 2002 (Week 12, Wednesday 11/13/2002)
Unified Distributed (UDub Mail) Life Cycle Objectives Sachin Pradhan Gabriel Maganis.
Lecture 24 Wireless Network Security
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
E a s y S h a r e Jung Son Ky Le. Operational Concepts Recent years, huge number of growth in Internet users and broadband usage File-sharing become extremely.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Web Security.
Internet Concept of protocols INTERNET Internet Service Provider (ISP) has connected to the Internet.
Network Security Celia Li Computer Science and Engineering York University.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Jedrzej Gorski Wroclaw University of Technology, Department of Electronics, 5th year Sametime RTC Gateway & Sametime Connect integration with SIP Communicator.
Communication Methods
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
CSE 403 LCO Presentation Chris Scoville. Operational Concepts Create a built in 411-type system in a cell phone Allows the user to find a person’s phone.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Centralized Grading System. LCO Objectives Operational Concepts System Requirements System and Software Architecture Lifecycle Plan Feasibility Rationale.
A CROSS PLATFORM REMOTE DESKTOP CONNECTION SUITE A.V.D.S.S.BHADRI RAJU D.RAMESH BABU U.JAYASREE G.NANIBABU.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
1 Example security systems n Kerberos n Secure shell.
Features to look for in a Work Management Software before choosing one.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Instructor Materials Chapter 5 Providing Network Services
Multilevel Marketing Tree Viewer
File Transfer and access
File Transfer Protocol
Clayton Chang, Justin McCarron, Vincent Pai
Project Change Control
Presentation transcript:

Encrypted Chat Program LCO Review Asif Daud & Craig Atkinson

Instant Message Eavesdropping Rival Company

Operational Concepts Will provide a secure and fast means of communication in the business world. Will provide a secure and fast means of communication in the business world. Program purchased by a company and clients installed on all employee computers, while having a central server at a location of their choosing. Program purchased by a company and clients installed on all employee computers, while having a central server at a location of their choosing. Technical staff of the company will be responsible for most of the maintenance and support of the software. Technical staff of the company will be responsible for most of the maintenance and support of the software.

System Requirements Secure conversations, and secure transmission of files. Secure conversations, and secure transmission of files. Contact list sorted by groups/teams in the company. Contact list sorted by groups/teams in the company. Ability to format text. Ability to format text.

System & Software Architecture Clients will connect to a central server through the TCP/IP protocol. Clients will connect to a central server through the TCP/IP protocol. Algorithms used: Algorithms used: –RSA public key-private key algorithm –GOST symmetric key algorithm –MD5 hashing algorithm to generate encryption keys.

Main Features Password protected accounts. Password protected accounts. Sortable lists of user contact information Sortable lists of user contact information Format message text with boldface, italics, font size, etc. Format message text with boldface, italics, font size, etc. Pre-recorded voice message alerts. Pre-recorded voice message alerts. Away messages. Away messages.

Life Cycle Plan Main target market: small-mid size businesses. Main target market: small-mid size businesses. Specific targets: Specific targets: –Contract companies –Telecommuting employees

Feasibility Rationale Risks: Risks: –Insufficient market –Existing products –Algorithms and architecture difficult to implement –Possible insecurity of encryption algorithms

Conclusion The software will be secure & useful. The software will be secure & useful. The project will be profitable. The project will be profitable. The project is feasible. The project is feasible.