SPM System Cybersecurity
Abdullah, Maysan (2016)
Abdullah, Maysan
Vaasan ammattikorkeakoulu
2016
All rights reserved
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-2016061312783
https://urn.fi/URN:NBN:fi:amk-2016061312783
Tiivistelmä
This document discusses the SPM (Student Project Management) system security measures and best practices.
The system will be integrated with VAMK’s own database and network, but it should also allow for external participants. Therefore, implementing an authentica-tion mechanism for the system is required, in addition to managing the users’ in-formation, passwords, and other sensitive data.
Three aspects are discussed which are: authentication, password hashing, and data encryption.
A secure authentication mechanism is provided, as well as discussing secure pass-word hashing techniques. The best hashing algorithm for the purposes of the sys-tem is decided to be the BCrypt algorithm.
Multiple encryption algorithms are discussed and compared. The comparison re-sulted in the decision to use the Blowfish algorithm as the encryption algorithm for the SPM system.
The chosen procedures and algorithms follow the recommendations of security experts, and are determined to be highly adequate for guaranteeing the safety and security of information in the SPM system.
The system will be integrated with VAMK’s own database and network, but it should also allow for external participants. Therefore, implementing an authentica-tion mechanism for the system is required, in addition to managing the users’ in-formation, passwords, and other sensitive data.
Three aspects are discussed which are: authentication, password hashing, and data encryption.
A secure authentication mechanism is provided, as well as discussing secure pass-word hashing techniques. The best hashing algorithm for the purposes of the sys-tem is decided to be the BCrypt algorithm.
Multiple encryption algorithms are discussed and compared. The comparison re-sulted in the decision to use the Blowfish algorithm as the encryption algorithm for the SPM system.
The chosen procedures and algorithms follow the recommendations of security experts, and are determined to be highly adequate for guaranteeing the safety and security of information in the SPM system.