Cryptography. Survey Results -More than 50% students or someone they know purchase goods, use banking, access or give out personal information online

Embed Size (px)

Citation preview

  • Slide 1
  • Cryptography
  • Slide 2
  • Survey Results -More than 50% students or someone they know purchase goods, use banking, access or give out personal information online -79% students use social networking website such as MySpace and Facebook -More than 50% students spend more than 2 hours everyday in the internet -85% students agree that internet security is concern of EVERYONE
  • Slide 3
  • Video -Sheldon's World of Warcraft character hacked -http://gawker.com/5788015/sheldons-world-of-warcraft-character-hacked-on-the- big-bang-theoryhttp://gawker.com/5788015/sheldons-world-of-warcraft-character-hacked-on-the- big-bang-theory
  • Slide 4
  • Slide 5
  • Security Threats
  • Slide 6
  • Recent News -Credit Card Breach at Home Depot and Target -Identity theft -Big Data
  • Slide 7
  • Encrypt - encrypt (n-kr pt) tr.v. encrypted, encrypting, encrypts. 1.To put into code or cipher. 2.Computer Science To alter (a file, for example) using a secret. Code - symbol or signal used to represent or communicate something-else Cryptosystem - consists of three algorithms Key Generation Encryption Decryption Encryption Terminology
  • Slide 8
  • Encryption -Terminolgy Cipher or Cypher- any method of transforming a message to conceal its meaning. ciphertext or cryptogram is the encrypted form of the message. Plain or clear text refers to either unencrypted text or successfully decrypted text. Key used to decrypt or de-cypher the encrypted message.
  • Slide 9
  • Encryption Methods Bit stream Block ciphering Symmetric Asmmetric Hybrid - In practice Ciphers Substitution ciphers Transposition ciphers XOR function Veignere cipher Vernam cipher
  • Slide 10
  • Uses in History
  • Slide 11
  • Hashing Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.
  • Slide 12
  • Demo - HashCalc HashCal- compute multiple hashes, checksums and HMACs for files, text and hex strings
  • Slide 13
  • Cipher Wheel Spies Like Us - Decipher it LA Noir - The Secret MessageLA Noir - The Secret Message Ceasars Cipher. Substitution Cipher created by Julius Ceasar. Also known as a shift Cipher ACTIVITY: Lets make a code wheel!
  • Slide 14
  • Demo-Cipher Wheel Encode H=Q we are cool spies cipher is fun Decode I=L PHHW PH DW QRRQ DOEXTXHUTXH ERWDQLFDO JDUGHQ
  • Slide 15
  • NSA - CRYPTOKIDS AMERICAS FUTURE CODEBREAKERS
  • Slide 16
  • More Resources PBS: How Enigma Works: www.pbs.org/wgbh/nova/military/how-enigma-works.html Cryptology - Purdue: http://www.cerias.purdue.edu/education/k- 12/teaching_resources/lessons_presentations/cryptology.htmlhttp://www.cerias.purdue.edu/education/k- 12/teaching_resources/lessons_presentations/cryptology.html Crypto Museum: http://www.cryptomuseum.com/crypto/enigma/ NSA- CryptoKids America https://www.nsa.gov/kids/home.shtml The NSA/CSS core missions are to protect U.S. national security systems and to produce foreign signals intelligence information.
  • Slide 17
  • Applications Digital Certificates: certifies the ownership of a public key by the named subject of the certificate. Main providers: Symantec (VeriSign), Comodo SSL, Go Daddy, GlobalSign
  • Slide 18
  • Issues with Digitial Certificate In 2010, VeriSign is hacked Comodo is hacked in 2009 and 2011 Hackers issued digitial certificates to one or more unauthorized parties
  • Slide 19
  • Applications (cont.) Digital Signatures
  • Slide 20
  • Applications (cont.) Passwords
  • Slide 21
  • IA Program at UNM http://ia.unm.edu Information Systems (IS) is a discipline that bridges business and computer science. IS professionals contribute to organizations in many ways including: Planning an organization's technology-related strategy and infrastructure Acquiring, developing, and managing computer hardware, networks, software, and related services Developing and managing an organization's databases Analyzing data to improve an organization's marketing, operations, and strategic planning
  • Slide 22
  • MS-ISA Program Targeted at students with an undergraduate degree in one of the following fields: Accounting Computer science (CS) or computer-related engineering Information systems (IS) or information technology (IT) Areas of Study Cybersecurity and information assurance Data analytics (Big data) Database management and data warehousing Fraud, white collar crime and digital & financial forensics Information system acquisition, development, and management System & network administration and security
  • Slide 23
  • Why choose IA at UNM Information Assurance Program at UNM Anderson An AACSB accredited program A designation from the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a center of academic excellence in IA education and research A partnership with the FBI and its Regional Computer Forensics Lab (RCFLA designation from the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a center of academic excellence in IA education and research A partnership with the FBI and its Regional Computer Forensics Lab (RCFL), housed at UNM, through training, and student internships and co-ops.RCFLUNM A partnership with the Department of Energy's first satellite office for the Center for Cyber Defenders through Sandia National Laboratories. Center for Cyber Defenders The Metro Law Enforcement Internship program
  • Slide 24
  • Scholarship Program UNM Information Assurance Scholarship for Service Program Pursue a Master's degree in Information Assurance at UNM. Scholarship pays all costs for three semesters: $2000 per month stipend, all tuition & fees, book allowance, travel allowance. Customize the degree program to your background and career goals: computer & network security, computer forensics, white collar crime, auditing, and compliance. Complete a summer internship with a Federal agency in Washington, D.C.
  • Slide 25
  • What you can do while in school Competitions: National Collegiate Cyber Defense Competition (CCDC) and Computer and Network Vulnerability Assessment Simulation (CANVAS) Get involved with student organization - Network Exploitation Security Team (NEST)
  • Slide 26
  • Career Path Work for government Department of Defense National Security Agency Department of Commerce Department of Energy Department of Homeland Security Jobs titles Computer Security Specialist Database Administrators Computer and Information Scientists Computer Support Specialists Network Systems and Data Communications Analysts The Computer Systems Administrator Computer and Information Systems Managers Management Information Systems Directors Project Managers Local Area Network and Wide Area Network Managers
  • Slide 27
  • Slide 28
  • Questions? Spies Like Us