securing cyberspace module introduction mr. burks

13
Securing Cyberspace Module Introduction Mr. Burks

Upload: kristopher-haynes

Post on 30-Dec-2015

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Securing Cyberspace Module Introduction Mr. Burks

Securing Cyberspace

Module Introduction

Mr. Burks

Page 2: Securing Cyberspace Module Introduction Mr. Burks

Cyberspace Security Module Flow

Things to Think About during the Next 6 Modules

1. Seek to understand the cyberspace phenomena and its social ramifications.

2. How is it caused and how you can prevent it?

3. Are there any applied materials systems that are relatable?

Bio-Virus

https://www.youtube.com/watch?v=Rpj0emEGShQ

Computer Virus

https://www.youtube.com/watch?v=sxal31zIKdE

Page 3: Securing Cyberspace Module Introduction Mr. Burks

Electronic and Biological Virus Systems

Purpose of Virus Systems:

-Copy and destroy

System/Social ramifications?

-Long-term health and sustainability, loss of control and motor functions

What’s the survival mechanism and can it be prevented?

-Multiple keys and blocking all keys by knowing the typical keys to reduce the chances of acquisition

Analogous Material Systems?

-Layered Encryption and composite materials

Page 4: Securing Cyberspace Module Introduction Mr. Burks

Electron Micrographs Guess the VirusHIV Aeromonas virus 31 Influenza

Orf virus Herpes simplex virus Smallpox

Page 5: Securing Cyberspace Module Introduction Mr. Burks

Y2K SCARE

https://www.youtube.com/watch?v=1YeA9C9ylQ0

Page 6: Securing Cyberspace Module Introduction Mr. Burks

Current Cyberspace Security Actions

Barksdale Airforce Base

https://www.youtube.com/watch?v=OL2IORXwg2E

Page 8: Securing Cyberspace Module Introduction Mr. Burks

Secure cyberspace: Importance

Person

APerson

Binformation sent

ConfidentialityIs the information capable

of being intercepted?

IntegrityIs Person B sure of who sent the information?

(Authenticity)

Cryptography helps achieve these goals…

Page 9: Securing Cyberspace Module Introduction Mr. Burks

• Cryptography is: – the science or study of the techniques of secret

writing [dictionary.com]– the practice and study of techniques for secure

communication in the presence of third parties [wikipedia.org]

Cryptography defined

Page 10: Securing Cyberspace Module Introduction Mr. Burks

Early Cryptography

• 3500BC: Sumerians– Cuneiform writings

• 1900BC: Egypt– First known use of

cryptography

• 500-600BC: ATBASH Cipher– Used by Hebrew scribes– Substitution cipher (reversed alphabet)

Page 11: Securing Cyberspace Module Introduction Mr. Burks

Early Cryptography

• 60-50BC: Julius Caesar– Substitution cipher– Shift letters by X positions:

• E.g. X=3: A->D, B->E, C->F

– Weakness? • Frequency analysis (1000AD)

– 1466 Leon Albertini: cipher disk • Used until 16th century

Page 12: Securing Cyberspace Module Introduction Mr. Burks

Deciphering Practice

“gsv hgifxgfiv zmw lkvizgrlm lu gsv vbv rh evib hrnrozi gl zm

vovxgilmrx

xznviz,zmw rg rh mzgfizo gl wrhxfhh gsvn gltvgsvi. ylgs ziv yzhvw

lm gdl nzqli

xlnklmvmgh: z ovmh zhhvnyob, zmw zm rnztrmt hvmhli. gsv ovmh

zhhvnyob

xzkgfivh z kligrlm lu gsv ortsg vnzmzgrmt uiln zm lyqvxg, zmw ulxfh

rg lmgl

gsv rnztrmt hvmhli. gsv rnztrmt hvmhli gsvm gizmhulinh gsv

kzggvim lu ortsg

rmgl z rwvl hrtmzo, vrgsvi vovxgilmrx li mvfizo.”

Page 13: Securing Cyberspace Module Introduction Mr. Burks

Make Your Own CipherCut a strip of paper some 4mm wide, 32cm long and light pencil lines drawn on it at 4mm distance. To give it the following shape: