Learning Objectives:

You will be able to identify how simple encryption works

You will be able to identify what makes a good password

You will be able to identify at least two different methods of confirming identity



Post: On Canvas identify the most popular and most bizzare BiometricMethod on Discussions > Bio-metric methods

Work on: Gathering content and designing your Final Project

Review: Different Biometrics methods of confirming identity. (voice, finger print, DNA, Eye)

Review: Phishing and Pharming security risks.

Review: Encryption Methods

Watch: DDoS attacks explaned

Watch: The Spoof on Biometric methods of confirming identity from the first part of the Monsters vs Aliens Trailer (first 15 seconds)

Watch: Weekly Video

Topics Covered:

Final Project must be validated!

30 pts Extra Credit for everyone who can crack my encrypted message in 10 minutes

Encrypted messages keeps a nations secrets especially in war

The German Enigma Machine turned the tide of the War. The Imitation Game is a movie about Alan Turing who helped crack the Enigma Machine


Phishing website info

Richard Clark & I agree on CyberSecurity

Funny Video on Hacking in the 90s

Gaps in the Cyber Law and NPR's Cyber Insecurity:

US Government Cyber Crime info

Leaking of Sensitive Information (Wikileaks)

CIA was hacked and these are some of the tools they lost.

Computer Security, and FBI Cyber Crimes


Advice for Password Security from the BBC

The Best computer security you can have is common sense!

Protect your password (20 worst passwords plus don't give your password to anyone), 
use a firewall on your network, update your Computers's Operating System with the latest patches and use virus protection!

SSL allow you to create a secure connection for transport of information over shttp.

Hold your data in encrypted storage!

Encryption Methods: Cryptography, Public Key Encryption

Report attacks and check for the latest attempts on computer systems

CERT® Coordination Center Carnegie Mellon University's Computer Emergency Response Team

CSRC Computer Security Resource Center

Have someone else in the class review your website using our notes on Good Web design


Encryption Methods:


Public Key Encryption


Biometrics: Using characteristics of your body (voice, finger print, DNA, Eye) for authentication.


Reminder: Post your articles on Canvas under the Weekly Articles on the Discussion Board Section.

Dr. Jon Storslee
Phone: 602-787-6734

HTML Valid

Paradise Valley Community College 
18401 N. 32nd Street Phoenix, AZ 85032