You will be able to identify how simple encryption works
You will be able to identify what makes a good password
You will be able to identify at least two different methods of confirming identity
Intro to Security
Watch: The Spoof on Biometric methods of confirming identity from the first part of the Monsters vs Aliens Trailer (first 15 seconds)
Post: On Canvas identify the most popular and most bizzare BiometricMethod on Discussions Bio-metric methods
Work on: Gathering content and designing your Final Project
Review: Different Biometrics methods of confirming identity. (voice, finger print, DNA, Eye)
Review: Phishing and Pharming security risks.
Review: Encryption Methods
30 pts Extra Credit for everyone who can crack my encrypted message in 10 minutes
Encrypted messages keeps a nations secrets especially in war
Navajo Code Talkers helped us win the war! Windtalkers is a movie about them
The German Enigma Machine turned the tide of the War. The Imitation Game is a movie about Alan Turing who helped crack the Enigma Machine
Phishing website info
Richard Clark & I agree on CyberSecurity
Gaps in the Cyber Law and NPR's Cyber Insecurity:
US Government Cyber Crime info
Leaking of Sensitive Information (Wikileaks)
CIA was hacked and these are some of the tools they lost.
Computer Security, and FBI Cyber Crimes
Advice for Password Security from the BBC
The Best computer security you can have is common sense!
Protect your password (20 worst passwords plus don't give your password to anyone),
use a firewall on your network, update your Computers's Operating System with the latest patches and use virus protection!SSL allow you to create a secure connection for transport of information over shttp.
Hold your data in encrypted storage!
Encryption Methods: Cryptography, Public Key Encryption
Report attacks and check for the latest attempts on computer systems
CERT® Coordination Center Carnegie Mellon University's Computer Emergency Response Team
CSRC Computer Security Resource Center
Have someone else in the class review your website using our notes on Good Web design
Encryption Methods:
Biometrics: Using characteristics of your body (voice, finger print, DNA, Eye) for authentication.
Reminder: Post your articles on Canvas under the Weekly Articles on the Discussion Board Section.