Upload
kristopher-haynes
View
224
Download
0
Tags:
Embed Size (px)
Citation preview
Securing Cyberspace
Module Introduction
Mr. Burks
Cyberspace Security Module Flow
Things to Think About during the Next 6 Modules
1. Seek to understand the cyberspace phenomena and its social ramifications.
2. How is it caused and how you can prevent it?
3. Are there any applied materials systems that are relatable?
Bio-Virus
https://www.youtube.com/watch?v=Rpj0emEGShQ
Computer Virus
https://www.youtube.com/watch?v=sxal31zIKdE
Electronic and Biological Virus Systems
Purpose of Virus Systems:
-Copy and destroy
System/Social ramifications?
-Long-term health and sustainability, loss of control and motor functions
What’s the survival mechanism and can it be prevented?
-Multiple keys and blocking all keys by knowing the typical keys to reduce the chances of acquisition
Analogous Material Systems?
-Layered Encryption and composite materials
Electron Micrographs Guess the VirusHIV Aeromonas virus 31 Influenza
Orf virus Herpes simplex virus Smallpox
Current Cyberspace Security Actions
Barksdale Airforce Base
https://www.youtube.com/watch?v=OL2IORXwg2E
https://www.youtube.com/watch?v=hqKafI7Amd8
Secure cyberspace: Importance
Person
APerson
Binformation sent
ConfidentialityIs the information capable
of being intercepted?
IntegrityIs Person B sure of who sent the information?
(Authenticity)
Cryptography helps achieve these goals…
• Cryptography is: – the science or study of the techniques of secret
writing [dictionary.com]– the practice and study of techniques for secure
communication in the presence of third parties [wikipedia.org]
Cryptography defined
Early Cryptography
• 3500BC: Sumerians– Cuneiform writings
• 1900BC: Egypt– First known use of
cryptography
• 500-600BC: ATBASH Cipher– Used by Hebrew scribes– Substitution cipher (reversed alphabet)
Early Cryptography
• 60-50BC: Julius Caesar– Substitution cipher– Shift letters by X positions:
• E.g. X=3: A->D, B->E, C->F
– Weakness? • Frequency analysis (1000AD)
– 1466 Leon Albertini: cipher disk • Used until 16th century
Deciphering Practice
“gsv hgifxgfiv zmw lkvizgrlm lu gsv vbv rh evib hrnrozi gl zm
vovxgilmrx
xznviz,zmw rg rh mzgfizo gl wrhxfhh gsvn gltvgsvi. ylgs ziv yzhvw
lm gdl nzqli
xlnklmvmgh: z ovmh zhhvnyob, zmw zm rnztrmt hvmhli. gsv ovmh
zhhvnyob
xzkgfivh z kligrlm lu gsv ortsg vnzmzgrmt uiln zm lyqvxg, zmw ulxfh
rg lmgl
gsv rnztrmt hvmhli. gsv rnztrmt hvmhli gsvm gizmhulinh gsv
kzggvim lu ortsg
rmgl z rwvl hrtmzo, vrgsvi vovxgilmrx li mvfizo.”
Make Your Own CipherCut a strip of paper some 4mm wide, 32cm long and light pencil lines drawn on it at 4mm distance. To give it the following shape: