Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cryptography. Survey Results -More than 50% students or someone they know purchase goods, use banking, access or give out personal information online.

Similar presentations


Presentation on theme: "Cryptography. Survey Results -More than 50% students or someone they know purchase goods, use banking, access or give out personal information online."— Presentation transcript:

1 Cryptography

2 Survey Results -More than 50% students or someone they know purchase goods, use banking, access or give out personal information online -79% students use social networking website such as MySpace and Facebook -More than 50% students spend more than 2 hours everyday in the internet -85% students agree that internet security is concern of EVERYONE

3 Video -Sheldon's World of Warcraft character hacked -http://gawker.com/5788015/sheldons-world-of-warcraft-character-hacked-on-the- big-bang-theoryhttp://gawker.com/5788015/sheldons-world-of-warcraft-character-hacked-on-the- big-bang-theory

4

5 Security Threats

6 Recent News -Credit Card Breach at Home Depot and Target -Identity theft -Big Data

7 Encrypt - en·crypt (n-kr pt) tr.v. en·crypt·ed, en·crypt·ing, en·crypts. 1.To put into code or cipher. 2.Computer Science To alter (a file, for example) using a secret. Code - symbol or signal used to represent or communicate something-else Cryptosystem - consists of three algorithms Key Generation Encryption Decryption Encryption Terminology

8 Encryption -Terminolgy Cipher or Cypher- any method of transforming a message to conceal its meaning. –ciphertext or cryptogram is the encrypted form of the message. –Plain or clear text refers to either unencrypted text or successfully decrypted text. Key – used to decrypt or de-cypher the encrypted message.

9 Encryption Methods Bit stream Block ciphering Symmetric Asmmetric Hybrid - In practice Ciphers Substitution ciphers Transposition ciphers XOR function Veignere cipher Vernam cipher

10 Uses in History

11 Hashing Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the original string.

12 Demo - HashCalc HashCal- compute multiple hashes, checksums and HMACs for files, text and hex strings

13 Cipher Wheel Spies Like Us - Decipher it LA Noir - The Secret MessageLA Noir - The Secret Message Ceasar’s Cipher. Substitution Cipher created by Julius Ceasar. Also known as a shift Cipher ACTIVITY: Let’s make a code wheel!

14 Demo-Cipher Wheel Encode H=Q we are cool spies cipher is fun Decode I=L PHHW PH DW QRRQ DOEXTXHUTXH ERWDQLFDO JDUGHQ

15 NSA - CRYPTOKIDS AMERICA’S FUTURE CODEBREAKERS

16 More Resources PBS: How Enigma Works: www.pbs.org/wgbh/nova/military/how-enigma-works.html Cryptology - Purdue: http://www.cerias.purdue.edu/education/k- 12/teaching_resources/lessons_presentations/cryptology.htmlhttp://www.cerias.purdue.edu/education/k- 12/teaching_resources/lessons_presentations/cryptology.html Crypto Museum: http://www.cryptomuseum.com/crypto/enigma/ NSA- CryptoKids America https://www.nsa.gov/kids/home.shtml The NSA/CSS core missions are to protect U.S. national security systems and to produce foreign signals intelligence information.

17 Applications Digital Certificates: certifies the ownership of a public key by the named subject of the certificate. Main providers: Symantec (VeriSign), Comodo SSL, Go Daddy, GlobalSign

18 Issues with Digitial Certificate In 2010, VeriSign is hacked Comodo is hacked in 2009 and 2011 Hackers issued digitial certificates to one or more unauthorized parties

19 Applications (cont.) Digital Signatures

20 Applications (cont.) Passwords

21 IA Program at UNM http://ia.unm.edu Information Systems (IS) is a discipline that bridges business and computer science. IS professionals contribute to organizations in many ways including: –Planning an organization's technology-related strategy and infrastructure –Acquiring, developing, and managing computer hardware, networks, software, and related services –Developing and managing an organization's databases –Analyzing data to improve an organization's marketing, operations, and strategic planning

22 MS-ISA Program Targeted at students with an undergraduate degree in one of the following fields: –Accounting –Computer science (CS) or computer-related engineering –Information systems (IS) or information technology (IT) Areas of Study –Cybersecurity and information assurance –Data analytics (Big data) –Database management and data warehousing –Fraud, white collar crime and digital & financial forensics –Information system acquisition, development, and management –System & network administration and security

23 Why choose IA at UNM Information Assurance Program at UNM Anderson An AACSB accredited program A designation from the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a center of academic excellence in IA education and research A partnership with the FBI and its Regional Computer Forensics Lab (RCFLA designation from the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a center of academic excellence in IA education and research A partnership with the FBI and its Regional Computer Forensics Lab (RCFL), housed at UNM, through training, and student internships and co-ops.RCFLUNM A partnership with the Department of Energy's first satellite office for the Center for Cyber Defenders through Sandia National Laboratories. Center for Cyber Defenders The Metro Law Enforcement Internship program

24 Scholarship Program UNM Information Assurance Scholarship for Service Program Pursue a Master's degree in Information Assurance at UNM. Scholarship pays all costs for three semesters: $2000 per month stipend, all tuition & fees, book allowance, travel allowance. Customize the degree program to your background and career goals: computer & network security, computer forensics, white collar crime, auditing, and compliance. Complete a summer internship with a Federal agency in Washington, D.C.

25 What you can do while in school Competitions: National Collegiate Cyber Defense Competition (CCDC) and Computer and Network Vulnerability Assessment Simulation (CANVAS) Get involved with student organization - Network Exploitation Security Team (NEST)

26 Career Path Work for government –Department of Defense –National Security Agency –Department of Commerce –Department of Energy –Department of Homeland Security Jobs’ titles –Computer Security Specialist –Database Administrators –Computer and Information Scientists –Computer Support Specialists –Network Systems and Data Communications Analysts –The Computer Systems Administrator –Computer and Information Systems Managers –Management Information Systems Directors –Project Managers –Local Area Network and Wide Area Network Managers

27

28 Questions? Spies Like Us


Download ppt "Cryptography. Survey Results -More than 50% students or someone they know purchase goods, use banking, access or give out personal information online."

Similar presentations


Ads by Google