Securing Cyberspace Module Introduction Mr Burks Cyberspace Security
Securing Cyberspace Module Introduction Mr. Burks
Cyberspace Security Module Flow Things to Think About during the Next 6 Modules 1. Seek to understand the cyberspace phenomena and its social ramifications. 2. How is it caused and how you can prevent it? 3. Are there any applied materials systems that are relatable? Computer Virus https: //www. youtube. com/watch? v=sxal 31 z. IKd. E Bio-Virus https: //www. youtube. com/watch? v =Rpj 0 em. EGSh. Q
Electronic and Biological Virus Systems Purpose of Virus Systems: Analogous Material Systems? -Copy and destroy -Layered Encryption and composite materials System/Social ramifications? -Long-term health and sustainability, loss of control and motor functions What’s the survival mechanism and can it be prevented? -Multiple keys and blocking all keys by knowing the typical keys to reduce the chances of acquisition
Electron Micrographs Guess the Virus HIV Orf virus Aeromonas virus 31 Herpes simplex virus Influenza Smallpox
Y 2 K SCARE https: //www. youtube. com/watch? v=1 Ye. A 9 C 9 yl. Q 0
Current Cyberspace Security Actions Barksdale Airforce Base https: //www. youtube. com/watch? v=OL 2 IORXwg 2 E
https: //www. youtube. com/watch? v=hq. Kaf. I 7 Amd 8
Secure cyberspace: Importance Person A information sent Cryptography helps achieve these goals… Confidentiality Is the information capable of being intercepted? Person B Integrity Is Person B sure of who sent the information? (Authenticity)
Cryptography defined • Cryptography is: – the science or study of the techniques of secret writing [dictionary. com] – the practice and study of techniques for secure communication in the presence of third parties [wikipedia. org]
Early Cryptography • 3500 BC: Sumerians – Cuneiform writings • 1900 BC: Egypt – First known use of cryptography • 500 -600 BC: ATBASH Cipher – Used by Hebrew scribes – Substitution cipher (reversed alphabet)
Early Cryptography • 60 -50 BC: Julius Caesar – Substitution cipher – Shift letters by X positions: • E. g. X=3: A->D, B->E, C->F – Weakness? • Frequency analysis (1000 AD) – 1466 Leon Albertini: cipher disk • Used until 16 th century
Deciphering Practice “gsv hgifxgfiv zmw lkvizgrlm lu gsv vbv rh evib hrnrozi gl zm vovxgilmrx xznviz, zmw rg rh mzgfizo gl wrhxfhh gsvn gltvgsvi. ylgs ziv yzhvw lm gdl nzqli xlnklmvmgh: z ovmh zhhvnyob, zmw zm rnztrmt hvmhli. gsv ovmh zhhvnyob xzkgfivh z kligrlm lu gsv ortsg vnzmzgrmt uiln zm lyqvxg, zmw ulxfh rg lmgl gsv rnztrmt hvmhli gsvm gizmhulinh gsv kzggvim lu ortsg rmgl z rwvl hrtmzo, vrgsvi vovxgilmrx li mvfizo. ”
Make Your Own Cipher Cut a strip of paper some 4 mm wide, 32 cm long and light pencil lines drawn on it at 4 mm distance. To give it the following shape:
- Slides: 13