Security%20 - PowerPoint PPT Presentation

About This Presentation
Title:

Security%20

Description:

Computer hackers, government intelligence agencies, criminals, and rival ... Passwords can be as simple as 123, or as complex as 30 or more letters (capital ... – PowerPoint PPT presentation

Number of Views:18
Avg rating:3.0/5.0
Slides: 19
Provided by: sau89
Learn more at: http://peace.saumag.edu
Category:

less

Transcript and Presenter's Notes

Title: Security%20


1
Security Encryption
  • Thomas Fenske Joseph Minter

2
Information Security
3
(No Transcript)
4
  • Information Security is the preservation of
    secrecy and integrity in the storage and
    transmission of information.(Intelligence
    Encyclopedia)

5
Security Breach
  1. Interception of messages
  2. Theft of stored data
  3. Information sabotage
  4. Spoofing
  5. Denial of service

6
  • Security is more important now than ever before
    due to an increase in electronic storage,
    processing, and transmission of information.
  • By typing in a user name and password, people can
    transfer money, shop, and manage financial
    accounts online.

7
  • Anybody who wants to protect their privacy and
    their identity have an interest in maintaining
    information security.
  • Computer hackers, government intelligence
    agencies, criminals, and rival businesses are
    some of the parties which might seek to breech
    information security.

8
The Patriot Act
9
  • The Patriot Act was passed through congress as
    a response to the attacks of 9/11.
  • This law allows for your personal records to be
    searched without your knowledge or consent,
    secret searches of your home and property without
    notice, and phone computer wire taps.
  • The Patriot ACT is an acronym for Uniting and
    Strengthening America by Providing Appropriate
    Tools Required to Intercept and Obstruct
    Terrorism.

10
  • The most important tools for the preservation of
    information security and encryption.
  • Passwords can be as simple as 123, or as complex
    as 30 or more letters (capital and lower case)
    numbers and characters.
  • The more complex the more secure!!
  • Because passwords can be simple, most people use
    short memorable passwords. They also tend to use
    the same password for multiple sites and
    institutions such as banks and credit card
    companies.

11
Security Sockets Layer
  • Security Sockets Layer or SSL is the leading
    internet security protocol.
  • SSL is used to do two things, validate the
    identity of a website, and create an encrypted
    connection when sending out personal information
    on the internet.

12
History of Encryption
  • Cryptography began thousands of years ago as
    basic coding sequences.
  • People would use general number sequences to
    describe words using a cipher of some kind.
  • Ex. 32-51-13-13-43 HELLO

1 2 3 4 5
1 A B C D E
2 F G H I/J K
3 L M N O P
4 Q R S T U
5 V W X Y Z
13
Ciphering and Cryptography
  • A Cipher is secret method of writing, as by
    transposition, such as a watermark, or
    substitution of letters to form a cryptic
    combination.
  • Encryption is derived from Cryptography and goes
    all the way back to the BC era.
  • In 1900 BC, Egyptians began substituting
    hieroglyphs within their form of writing.

14
Encryption before computers
  • Before Computers, Encryption was primary used to
    keep classified information from being read by
    anyone who was not in the need to know.
  • Some famous Encryption devices include The
    Enigma Machine (Germany), Purple (Japan),
    Sigaba (US Enigma)

15
The Enigma Machine
  • The Enigma Machine used three Rotors at a time
    out of a possible five to encrypt the lettering
    sequence of the words typed.
  • Each letter that was typed on the machine had a
    corresponding light that signified the encryption
    letter.
  • Each separate branch of the German Military had a
    different Enigma Cipher machine.

16
Public Key Encryption
  • Using matched Public/private key pairs
  • Anyone Can encrypt with the public Key, but only
    one person with the private key can decrypt the
    message.
  • Many companies use a public key encryption form
    including email clients and State Agencies.
  • Determining public Key Encryption is simple. When
    loading a secure source a picture of a key will
    be shown in the bottom right corner of the
    browser being used as well as HTTPS//

17
Digital Signature Algorithm (DSA)
  • Developed by the US Government in 1993
  • Key Generation has two phases
  • Choosing your algorithm function parameters
  • Compute the Private and public keys for the user.
  • DIS is a 128 Bit Block size. Meaning that the
    password used to encrypt the information is 120
    random characters long with a 8 bit character
    fail-safe.

18
Hash Functions
  • A Hash Function is an algorithm that turns plain
    text into a hash value.
  • A hash value is the fixed-length result of a one
    way hash function.
  • The value is used as a fingerprint of the
    computer that it was accessed from.
  • One of the easiest objects that could be
    described as a hash function is a cookie.
Write a Comment
User Comments (0)
About PowerShow.com