Download presentation
Presentation is loading. Please wait.
Published byKristopher Haynes Modified over 9 years ago
1
Securing Cyberspace Module Introduction Mr. Burks
2
Cyberspace Security Module Flow Things to Think About during the Next 6 Modules 1.Seek to understand the cyberspace phenomena and its social ramifications. 2.How is it caused and how you can prevent it? 3.Are there any applied materials systems that are relatable? Bio-Virus https://www.youtube.com/watch?v =Rpj0emEGShQ Computer Virus https://www.youtube.com/watch? v=sxal31zIKdE
3
Electronic and Biological Virus Systems Purpose of Virus Systems: -Copy and destroy System/Social ramifications? -Long-term health and sustainability, loss of control and motor functions What’s the survival mechanism and can it be prevented? -Multiple keys and blocking all keys by knowing the typical keys to reduce the chances of acquisition Analogous Material Systems? -Layered Encryption and composite materials
4
Electron Micrographs Guess the Virus HIV Aeromonas virus 31 Influenza Orf virusHerpes simplex virusSmallpox
5
Y2K SCARE https://www.youtube.com/watch?v=1YeA9C9ylQ0
6
Current Cyberspace Security Actions Barksdale Airforce Base https://www.youtube.com/watch?v=OL2IORXwg2E
7
https://www.youtube.com/watch?v=hqKafI7Amd8
8
Secure cyberspace: Importance Person A Person B information sent Confidentiality Is the information capable of being intercepted? Integrity Is Person B sure of who sent the information? (Authenticity) Cryptography helps achieve these goals…
9
Cryptography is: – the science or study of the techniques of secret writing [dictionary.com] – the practice and study of techniques for secure communication in the presence of third parties [wikipedia.org] Cryptography defined
10
Early Cryptography 3500BC: Sumerians – Cuneiform writings 1900BC: Egypt – First known use of cryptography 500-600BC: ATBASH Cipher – Used by Hebrew scribes – Substitution cipher (reversed alphabet)
11
Early Cryptography 60-50BC: Julius Caesar – Substitution cipher – Shift letters by X positions: E.g. X=3: A->D, B->E, C->F – Weakness? Frequency analysis (1000AD) – 1466 Leon Albertini: cipher disk Used until 16 th century
12
Deciphering Practice “gsv hgifxgfiv zmw lkvizgrlm lu gsv vbv rh evib hrnrozi gl zm vovxgilmrx xznviz,zmw rg rh mzgfizo gl wrhxfhh gsvn gltvgsvi. ylgs ziv yzhvw lm gdl nzqli xlnklmvmgh: z ovmh zhhvnyob, zmw zm rnztrmt hvmhli. gsv ovmh zhhvnyob xzkgfivh z kligrlm lu gsv ortsg vnzmzgrmt uiln zm lyqvxg, zmw ulxfh rg lmgl gsv rnztrmt hvmhli. gsv rnztrmt hvmhli gsvm gizmhulinh gsv kzggvim lu ortsg rmgl z rwvl hrtmzo, vrgsvi vovxgilmrx li mvfizo.”
13
Make Your Own Cipher Cut a strip of paper some 4mm wide, 32cm long and light pencil lines drawn on it at 4mm distance. To give it the following shape:
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.