Survey Results -More than 50% students or someone they know
purchase goods, use banking, access or give out personal
information online -79% students use social networking website such
as MySpace and Facebook -More than 50% students spend more than 2
hours everyday in the internet -85% students agree that internet
security is concern of EVERYONE
Slide 3
Video -Sheldon's World of Warcraft character hacked
-http://gawker.com/5788015/sheldons-world-of-warcraft-character-hacked-on-the-
big-bang-theoryhttp://gawker.com/5788015/sheldons-world-of-warcraft-character-hacked-on-the-
big-bang-theory
Slide 4
Slide 5
Security Threats
Slide 6
Recent News -Credit Card Breach at Home Depot and Target
-Identity theft -Big Data
Slide 7
Encrypt - encrypt (n-kr pt) tr.v. encrypted, encrypting,
encrypts. 1.To put into code or cipher. 2.Computer Science To alter
(a file, for example) using a secret. Code - symbol or signal used
to represent or communicate something-else Cryptosystem - consists
of three algorithms Key Generation Encryption Decryption Encryption
Terminology
Slide 8
Encryption -Terminolgy Cipher or Cypher- any method of
transforming a message to conceal its meaning. ciphertext or
cryptogram is the encrypted form of the message. Plain or clear
text refers to either unencrypted text or successfully decrypted
text. Key used to decrypt or de-cypher the encrypted message.
Slide 9
Encryption Methods Bit stream Block ciphering Symmetric
Asmmetric Hybrid - In practice Ciphers Substitution ciphers
Transposition ciphers XOR function Veignere cipher Vernam
cipher
Slide 10
Uses in History
Slide 11
Hashing Hashing is the transformation of a string of characters
into a usually shorter fixed-length value or key that represents
the original string.
Slide 12
Demo - HashCalc HashCal- compute multiple hashes, checksums and
HMACs for files, text and hex strings
Slide 13
Cipher Wheel Spies Like Us - Decipher it LA Noir - The Secret
MessageLA Noir - The Secret Message Ceasars Cipher. Substitution
Cipher created by Julius Ceasar. Also known as a shift Cipher
ACTIVITY: Lets make a code wheel!
Slide 14
Demo-Cipher Wheel Encode H=Q we are cool spies cipher is fun
Decode I=L PHHW PH DW QRRQ DOEXTXHUTXH ERWDQLFDO JDUGHQ
Slide 15
NSA - CRYPTOKIDS AMERICAS FUTURE CODEBREAKERS
Slide 16
More Resources PBS: How Enigma Works:
www.pbs.org/wgbh/nova/military/how-enigma-works.html Cryptology -
Purdue: http://www.cerias.purdue.edu/education/k-
12/teaching_resources/lessons_presentations/cryptology.htmlhttp://www.cerias.purdue.edu/education/k-
12/teaching_resources/lessons_presentations/cryptology.html Crypto
Museum: http://www.cryptomuseum.com/crypto/enigma/ NSA- CryptoKids
America https://www.nsa.gov/kids/home.shtml The NSA/CSS core
missions are to protect U.S. national security systems and to
produce foreign signals intelligence information.
Slide 17
Applications Digital Certificates: certifies the ownership of a
public key by the named subject of the certificate. Main providers:
Symantec (VeriSign), Comodo SSL, Go Daddy, GlobalSign
Slide 18
Issues with Digitial Certificate In 2010, VeriSign is hacked
Comodo is hacked in 2009 and 2011 Hackers issued digitial
certificates to one or more unauthorized parties
Slide 19
Applications (cont.) Digital Signatures
Slide 20
Applications (cont.) Passwords
Slide 21
IA Program at UNM http://ia.unm.edu Information Systems (IS) is
a discipline that bridges business and computer science. IS
professionals contribute to organizations in many ways including:
Planning an organization's technology-related strategy and
infrastructure Acquiring, developing, and managing computer
hardware, networks, software, and related services Developing and
managing an organization's databases Analyzing data to improve an
organization's marketing, operations, and strategic planning
Slide 22
MS-ISA Program Targeted at students with an undergraduate
degree in one of the following fields: Accounting Computer science
(CS) or computer-related engineering Information systems (IS) or
information technology (IT) Areas of Study Cybersecurity and
information assurance Data analytics (Big data) Database management
and data warehousing Fraud, white collar crime and digital &
financial forensics Information system acquisition, development,
and management System & network administration and
security
Slide 23
Why choose IA at UNM Information Assurance Program at UNM
Anderson An AACSB accredited program A designation from the
National Security Agency (NSA) and the Department of Homeland
Security (DHS) as a center of academic excellence in IA education
and research A partnership with the FBI and its Regional Computer
Forensics Lab (RCFLA designation from the National Security Agency
(NSA) and the Department of Homeland Security (DHS) as a center of
academic excellence in IA education and research A partnership with
the FBI and its Regional Computer Forensics Lab (RCFL), housed at
UNM, through training, and student internships and co-ops.RCFLUNM A
partnership with the Department of Energy's first satellite office
for the Center for Cyber Defenders through Sandia National
Laboratories. Center for Cyber Defenders The Metro Law Enforcement
Internship program
Slide 24
Scholarship Program UNM Information Assurance Scholarship for
Service Program Pursue a Master's degree in Information Assurance
at UNM. Scholarship pays all costs for three semesters: $2000 per
month stipend, all tuition & fees, book allowance, travel
allowance. Customize the degree program to your background and
career goals: computer & network security, computer forensics,
white collar crime, auditing, and compliance. Complete a summer
internship with a Federal agency in Washington, D.C.
Slide 25
What you can do while in school Competitions: National
Collegiate Cyber Defense Competition (CCDC) and Computer and
Network Vulnerability Assessment Simulation (CANVAS) Get involved
with student organization - Network Exploitation Security Team
(NEST)
Slide 26
Career Path Work for government Department of Defense National
Security Agency Department of Commerce Department of Energy
Department of Homeland Security Jobs titles Computer Security
Specialist Database Administrators Computer and Information
Scientists Computer Support Specialists Network Systems and Data
Communications Analysts The Computer Systems Administrator Computer
and Information Systems Managers Management Information Systems
Directors Project Managers Local Area Network and Wide Area Network
Managers