S/MIME | RMS |
Provides non-repudiation and identity attestation of the sender | Provides information usage policy enforcement |
Provides for integrity protection and proof of tampering (signature validation) | Prevents tampering due to encryption |
Security boundary may span outside corporate boundaries and firewalls | Policy persisted with the content |
End to end encryption prevents sniffing and message interception | End to end encryption prevents sniffing and message interception |
Cross-platform interoperability and wide application support | Windows Platform only (98SE and above), CE and Mac next |
Two factor authentication for sending and receiving s/mime enabled mail | Prevents users from using expired content or information |
Strong encryption and very large key sizes | Fixed encryption key sizes and algorithms |
Limited message compression only in OWA | Provides message compression for all modes |
Sunday, January 18, 2009
S/MIME Vs RMS -Part I
Tuesday, January 6, 2009
Threat Model of "Star Wars"
Death Star Threat Modeling –
Part 1- http://www.youtube.com/watch?v=x0HfHmRN9x4
Part 2- http://www.youtube.com/watch?v=OHnXsL4Z3vo
Part -3 http://www.youtube.com/watch?v=ZWT_5TGZ5h4
Part 1- http://www.youtube.com/watch?v=x0HfHmRN9x4
Part 2- http://www.youtube.com/watch?v=OHnXsL4Z3vo
Part -3 http://www.youtube.com/watch?v=ZWT_5TGZ5h4
Subscribe to:
Posts (Atom)