Securing Cyberspace Module Introduction Mr. Burks.

13
Securing Cyberspace Module Introduction Mr. Burks

Transcript of Securing Cyberspace Module Introduction Mr. Burks.

Page 1: Securing Cyberspace Module Introduction Mr. Burks.

Securing Cyberspace

Module Introduction

Mr. Burks

Page 2: Securing Cyberspace Module Introduction Mr. Burks.

Cyberspace Security Module Flow

Things to Think About during the Next 6 Modules

1. Seek to understand the cyberspace phenomena and its social ramifications.

2. How is it caused and how you can prevent it?

3. Are there any applied materials systems that are relatable?

Bio-Virus

https://www.youtube.com/watch?v=Rpj0emEGShQ

Computer Virus

https://www.youtube.com/watch?v=sxal31zIKdE

Page 3: Securing Cyberspace Module Introduction Mr. Burks.

Electronic and Biological Virus Systems

Purpose of Virus Systems:

-Copy and destroy

System/Social ramifications?

-Long-term health and sustainability, loss of control and motor functions

What’s the survival mechanism and can it be prevented?

-Multiple keys and blocking all keys by knowing the typical keys to reduce the chances of acquisition

Analogous Material Systems?

-Layered Encryption and composite materials

Page 4: Securing Cyberspace Module Introduction Mr. Burks.

Electron Micrographs Guess the VirusHIV Aeromonas virus 31 Influenza

Orf virus Herpes simplex virus Smallpox

Page 5: Securing Cyberspace Module Introduction Mr. Burks.

Y2K SCARE

https://www.youtube.com/watch?v=1YeA9C9ylQ0

Page 6: Securing Cyberspace Module Introduction Mr. Burks.

Current Cyberspace Security Actions

Barksdale Airforce Base

https://www.youtube.com/watch?v=OL2IORXwg2E

Page 8: Securing Cyberspace Module Introduction Mr. Burks.

Secure cyberspace: Importance

Person

APerson

Binformation sent

ConfidentialityIs the information capable

of being intercepted?

IntegrityIs Person B sure of who sent the information?

(Authenticity)

Cryptography helps achieve these goals…

Page 9: Securing Cyberspace Module Introduction Mr. Burks.

• Cryptography is: – the science or study of the techniques of secret

writing [dictionary.com]– the practice and study of techniques for secure

communication in the presence of third parties [wikipedia.org]

Cryptography defined

Page 10: Securing Cyberspace Module Introduction Mr. Burks.

Early Cryptography

• 3500BC: Sumerians– Cuneiform writings

• 1900BC: Egypt– First known use of

cryptography

• 500-600BC: ATBASH Cipher– Used by Hebrew scribes– Substitution cipher (reversed alphabet)

Page 11: Securing Cyberspace Module Introduction Mr. Burks.

Early Cryptography

• 60-50BC: Julius Caesar– Substitution cipher– Shift letters by X positions:

• E.g. X=3: A->D, B->E, C->F

– Weakness? • Frequency analysis (1000AD)

– 1466 Leon Albertini: cipher disk • Used until 16th century

Page 12: Securing Cyberspace Module Introduction Mr. Burks.

Deciphering Practice

“gsv hgifxgfiv zmw lkvizgrlm lu gsv vbv rh evib hrnrozi gl zm

vovxgilmrx

xznviz,zmw rg rh mzgfizo gl wrhxfhh gsvn gltvgsvi. ylgs ziv yzhvw

lm gdl nzqli

xlnklmvmgh: z ovmh zhhvnyob, zmw zm rnztrmt hvmhli. gsv ovmh

zhhvnyob

xzkgfivh z kligrlm lu gsv ortsg vnzmzgrmt uiln zm lyqvxg, zmw ulxfh

rg lmgl

gsv rnztrmt hvmhli. gsv rnztrmt hvmhli gsvm gizmhulinh gsv

kzggvim lu ortsg

rmgl z rwvl hrtmzo, vrgsvi vovxgilmrx li mvfizo.”

Page 13: Securing Cyberspace Module Introduction Mr. Burks.

Make Your Own CipherCut a strip of paper some 4mm wide, 32cm long and light pencil lines drawn on it at 4mm distance. To give it the following shape: