10

Week Fourteen Agenda

  • Upload
    selah

  • View
    43

  • Download
    0

Embed Size (px)

DESCRIPTION

Week Fourteen Agenda. Announcements Final exam test dates. December 11 through 18. Presentations Hash Function If there are problems associated with taking the final exam , call me at 614.519.5853 and be persistent . Week Fourteen . - PowerPoint PPT Presentation

Citation preview

Page 1: Week Fourteen Agenda
Page 2: Week Fourteen Agenda

Announcements

Final exam test dates. December 11 through 18.

PresentationsHash Function

If there are problems associated with taking the final exam, call me at 614.519.5853

and be persistent.

WEEK FOURTEEN AGENDA

Page 3: Week Fourteen Agenda

AgendaWeek Fourteen December 9, 2013 Open Source presenter(s) are:

Student name: Stacy ZimmermanOpen source topic: Brain Workshop (14)

Student name: Cynthia ShoenlebenOpen source topic: JASIG's uPortal (14)

Student name: Ryan AllisonOpen source topic: GNS3 (14)Student name: Paul BurkholderOpen source topic: Asterisk (14)

WEEK FOURTEEN

Page 4: Week Fourteen Agenda

Agenda Week Fourteen December 9, 2013 Open Source presenter(s) are:

Student name: Paula Godley-CooperOpen source topic: Funambol (14)

Student name: Anne SalmonOpen source topic: CamStudio (14)

Student name: Charles HayesOpen source topic: Ubuntu (14)

Student name: Clarence IrbyOpen source topic: Ganglia Monitoring System (14)

WEEK FOURTEEN

Page 5: Week Fourteen Agenda

Agenda Week Fourteen December 9, 2013 Open Source presenter(s) are:

Student name: Nathan StockwellOpen source topic: DD-WRT (14)

Student name: Kyle MokmaOpen source topic: Chromium OS (14)

Student name: Justin BargaOpen source topic:  KeePass (14)

Student name:  David AbramsOpen source topic:    (14)

WEEK FOURTEEN

Page 6: Week Fourteen Agenda

Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string. Hashing is

used to index and retrieve items in a database because it is faster to find the item using the shorter hashed key than to find it using the original value. It

is also used in many encryption algorithms.

WEEK FOURTEEN

Page 7: Week Fourteen Agenda

WEEK FOURTEEN

Page 8: Week Fourteen Agenda

In cryptography, encryption is the process of encoding messages (or information) in such a way that third parties cannot read it, and only authorized parties can. Encryption doesn't prevent hacking but it prevents the hacker from reading the data that is encrypted. In an

encryption scheme, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it

into an unreadable ciphertext (ibid.). This is usually done with the use of an encryption key, which specifies how the message is to be encoded. Any adversary that can see the ciphertext should not be

able to determine anything about the original message. An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key,

that adversaries do not have access to. For technical reasons, an encryption scheme usually needs a key-generation algorithm to

randomly produce keys.

WEEK FOURTEEN

Page 9: Week Fourteen Agenda

The MD5 message-digest algorithm is a widely used crytographic hash function producing a 128 bit (16 byte) hash value typically represented as a 32 digit hexadecimal number.

MD5 is utilized in a variety of security applications. It is widely used to check data integrity.

WEEK FOURTEEN

Page 10: Week Fourteen Agenda

Questions and Issues

Your final exam status will be displayed on the Announcement page as the completed exams are

received.

WEEK FOURTEEN AGENDA