Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management.

Slides:



Advertisements
Similar presentations
CLASSICAL ENCRYPTION TECHNIQUES
Advertisements

E - safety How e-safe are you?.
Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Social Networking: Facebook, Google+, and Pinterest (and maybe one or two others) Mary Rotman Publicist, OReilly Media.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Computer Science 101 Data Encryption And Computer Networks.
Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules.
A Presentation by: ~Ksenia Potapov ~Amariah Condon ~Janette Fong ~Janice Lau CRYPTOGRAPHY.
e-safety and cyber bullying
Starter for 10 Unit 11: Facebook Transform IT SFT11_Facebook.
Social Networking: Facebook, Twitter, and Google+ Mary Rotman Publicist, O’Reilly Media.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Cryptography CS-103 Chapter 8. History Humans have been devising systems to encode information for at least 4000 years.Humans have been devising systems.
Information for Students and Families
Welcome to Poppy Road’s Safer Internet day. What do you think internet safety is about?
Do you know how to keep yourself safe?
Chapter 2 – Classical Encryption Techniques
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Fmdszqujpo! Encryption!. Encryption  Group Activity 1:  Take the message you were given, and create your own encryption.  You can encrypt it anyway.
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
ESCCO Data Security Training David Dixon September 2014.
CS110: Computers and the Internet Encryption and Certificates.
The Internet. A Little About Me I’m a UNM graduate student As well as an UNM alumni and UNM employee Born and raised in Albuquerque I have a house and.
Chapter 2 – Elementary Cryptography  Concepts of encryption  Cryptanalysis  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public.
FACEBOOK IS THE BEST THING THAT EVER HAPPENED TO FRIENDSHIP WHY I LIKE FACEBOOK! By Mike Matthews.
Controlling Your Social Networking Privacy Settings Stay safe online!
Parenting in the Internet Age Tips for Keeping Kids Safe and you Connected to your Teen.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Encryption: A Brief History Author: Margery Waldron.
Cryptography By, Anthony Lonigro & Valentine Mbah.
LIS508 last lecture: Cryptography & Security Thomas Krichel
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Advisory Lesson.  The internet can be a fun way to share information and “stay connected” with your friends, but bad things can happen.  The following.
Abstract: Cryptology is a combination of the processes of keeping a message secret (cryptography) and trying to break the secrecy of that message (cryptoanalysis).
Elementary Cryptography  Concepts of encryption  Symmetric (secret key) Encryption (DES & AES)(DES & AES)  Asymmetric (public key) Encryption (RSA)(RSA)
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
Section 2.5 Polyaphabetic Substitutions
Social Media: The Basics Teresa Marks School Community Oral Health Conference Friday, October 16, 2015.
Protecting Yourself on Social Media – Friend Requests And Messages.
Encryption CS110: Computer Science and the Internet.
Safety and Security Online: Private Information. Identify private information Recall that private information should not be given out in cyberspace.
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
CS 150 – Computing: From Ada to the Web Cryptography.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Some of these PowerPoint pages were created by my friend Shawna Haider.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Basically; teaching your children how to stay safe when using the internet.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Tech Tuesday: Facebook 101 People’s Resource Center January 26, 2016.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Christa Marsh Southern Arkansas University Biology Professor.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Gosbecks E-Safety Guide
Encryption with Keys and Passwords
Substitution Ciphers.
Introduction To Cryptography
Basic Encryption Methods
THE SOCIAL NETWORK & ONLINE PRIVACY
Lesson 4-5 AP Computer Science Principles
History of Cryptography
Helping teachers connect instantly with students and parents
Online Safety: Rights and Responsibilities
Computer Security Chapter Two
Chapter Goals Define cryptography
Presentation transcript:

Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management

Why Are We Here? 84% of you have learned safe practices for online activities in school or at home. We’re going to build upon your basic Internet “street smarts.” We’ll focus on some technologies that are used to protect private information: –Encryption: Digital code that stores information securely –Passwords: How to hacker-proof your accounts

Cryptography cipher: a method of encryption, including the algorithm, key(s), and other variables used to encode and decode a message keyword: word or phrase used in conjunction with an algorithm to encrypt and decrypt messages – like a password! encryption: conversion of plaintext to ciphertext decryption: conversion of ciphertext to plaintext cryptanalysis: the process of deciphering an encrypted message without knowing the algorithms and keys used to perform the encryption. plaintext: an original unencrypted message or a message that has been successfully decrypted ciphertext or cryptogram: an encoded message resulting from encryption code: the system or set of rules for converting words or phrases into a cryptogram

Background of Cryptography The Old Testament Book of Jeremiah employs a reversed-alphabet cipher to encode sensitive words. The ATBASH Cipher

Background of Cryptography Julius Caesar made code by shifting the alphabet over by three letters and then substituting Greek letters for Roman.

Background of Cryptography Thomas Jefferson used a 26-letter cipher wheel to encrypt/decrypt official correspondence while serving as ambassador to France. Recipient would need own device to decode the message. plaintext ciphertext

Background of Cryptanalysis The Enigma, a mechanical encryption machine with four rotary ciphers, was used by the Germans in WWII. Its code. was thought to be unbreakable. The Allies built the giant “Bombe” machine to crack the Enigma cipher.

Cryptograms and Passwords Lessons learned from cryptanalysis of the Enigma code drive home two practices we now observe in setting passwords: –Change them regularly The Germans rotated their Enigma keys daily. –Don’t write them down The Allies might never have broken the code if not for documentation they got from captured U-boats.

The Dictionary Cipher

156, 25, 5

The Vigenère Cipher The simple way to use the cipher is by choosing one row to use for encryption – like Julius Caesar did! However, this method is not the most secure. What is a weakness of the cryptogram produced by this method? Repeating letters may tip off a cryptanalyst as to the method behind the code! plaintext: AMANDA

The Vigenère Cipher The better way to use the cipher is to switch rows before encoding each letter. This can be done in sequence or in the order determined by a keyword.     KEYWORDKEYWORD plaintext: Using multiple alphabets rotated in keyword order strengthens the code! AMANDA

Digital Encryption Activity We’ve seen the advantage of using a polyalphabetic cipher for encryption. Let’s see what happens when we use multiple keywords with the cipher…

Everyday Uses of Encryption Securing transmissions Securing web transactions –Wherever you see a URL beginning “ Securing wireless networks Securing individual files What is the key to encryption and decryption of each of these? …a PASSWORD!

Passwords Passwords need to have two qualities: Secure and difficult to crack. Easy to remember

Passwords Cracking a Password –Brute Force Using Common Passwords –Guessing Using Known Passwords “12345” “qwerty” “password” Your Name: “amanda” Your Birthday: “1286” Your favorite TV Show: “spongebob

Passwords Creating a good password: –Dlkj509$13409oi$dslSDF90tq39u45^0qujnkja 98q^u %nd8sq oikljfna0q#0 95 How are you going to remember that?

Passwords Some Tricks for making a good Password: –Make up an anagram: Mrs. Funnell’s class is my favorite part of the day. I can’t wait. M.F’cimfpotd.Icw. M.F’c1m4p0td.Icw.

Passwords Don’t –Write down your password –Share your password –Create bad password hints Obvious hints: “My teacher’s name” Starts with “M.F”

Facebook and Social Networks The first popular social networking websites took off in the early 2000s Provide an online presence w/o need for a personal website Encourage connecting with other users, establishing a online network that resembles real-life social circle Allow users to share news, etc. with many friends at once vs. sharing one-on-one via

Is Facebook For Me? At age 13, young people can register for Facebook accounts. 29% of your classmates are already active on Facebook. While Facebook is a fun way to stay connected with friends and family, it is also a source of leaks for private information. How will you protect your privacy if you join Facebook?

Facebook By default, your profile, photos, and posts can be viewed by everyone Contact information visible to “friends” Accept “friend” requests carefully “Friends of friends” are not under your control Use the “Preview My Profile” option “Checking in” places not a great idea Facebook and Social Networking

Sharing Personal Information FacebookFacebook and Social Networking Click here to jump to Amanda’s profile for tour of what NOT to show. Recommend one thing on this profile that Mark should hide from public view.

FacebookFacebook and Social Networking …and photos other people have taken of him. Visitors to Mark’s Facebook page see both photos he has uploaded… When and why might that be a problem? Click here to jump to Amanda’s profile for DOs and DON’Ts of photos to share.

4/5 have been taught internet security 1/4 do things on the internet that their parents don’t know about 1/5 opened an attachment from someone they don’t know

1/2 of you have talked with someone online that you’ve never met face to face or you talk about yourself online 9/10 of you have a cell phone or smartphone Almost all of you have a device that can be used to access wireless networks at home.