ia.mgt.unm.edu

Cryptography Survey Results - More than 50% students or someone they know purchase goods, use banking, access or give out personal information online - 79% students use social networking website such as MySpace and Facebook - More than 50% students spend more than 2 hours everyday in the internet

- 85% students agree that internet security is concern of EVERYONE Video - Sheldon's World of Warcraft character hacked - http://gawker.com/5788015/sheldons-world-of-warcraft-character-hacked-on-the-bi g-bang-theory

Security Threats Recent News - Credit Card Breach at Home Depot and Target - Identity theft - Big Data Encryption Terminology Encrypt - encrypt (n-kr pt) tr.v. encrypted, encrypting, encrypts. 1. To put into code or cipher.

2. Computer Science To alter (a file, for example) using a secret. Code - symbol or signal used to represent or communicate something-else Cryptosystem - consists of three algorithms Key Generation Encryption Decryption Encryption -Terminolgy Cipher or Cypher- any

method of transforming a message to conceal its meaning. ciphertext or cryptogram is the encrypted form of the message. Plain or clear text refers to either unencrypted text or successfully decrypted text.

Key used to decrypt or de-cypher the encrypted message. Encryption Methods Bit stream Block ciphering Symmetric

Asmmetric Hybrid - In practice Ciphers

Substitution ciphers Transposition ciphers XOR function Veignere cipher Vernam cipher Uses in History Hashing Hashing is the transformation of a string of characters into a usually shorter

fixed-length value or key that represents the original string. Demo - HashCalc HashCal- compute multiple hashes, checksums and HMACs for files, text and hex strings Cipher Wheel

Spies Like Us - Decipher it LA Noir - The Secret Messa ge Ceasars Cipher. Substitution Cipher created by Julius Ceasar. Also known as a shift Cipher ACTIVITY: Lets make a

code wheel! Demo-Cipher Wheel Encode H=Q we are cool spies cipher is fun Decode I=L PHHW PH DW QRRQ

DOEXTXHUTXH ERWDQLFDO JDUGHQ NSA - CRYPTOKIDS AMERICAS FUTURE CODEBREAKERS More Resources PBS: How Enigma Works: www.pbs.org/wgbh/nova/military/how-enigma-works.html

Cryptology - Purdue: http://www.cerias.purdue.edu/education/k-12/teaching_resources/lessons_presen tations/cryptology.html Crypto Museum:

http://www.cryptomuseum.com/crypto/enigma/ NSA- CryptoKids America https://www.nsa.gov/kids/home.shtml The NSA/CSS core missions are to protect U.S. national security systems and to produce foreign signals intelligence information. Applications Digital Certificates: certifies the ownership of

a public key by the named subject of the certificate. Main providers: Symantec (VeriSign), Comodo SSL, Go Daddy, GlobalSign Issues with Digitial Certificate In 2010, VeriSign is

hacked Comodo is hacked in 2009 and 2011 Hackers issued digitial certificates to one or more unauthorized parties Applications (cont.) Digital Signatures

Applications (cont.) Passwords IA Program at UNM http://ia.unm.edu Information Systems (IS) is a discipline that bridges business and computer science. IS professionals contribute to organizations in many ways including:

Planning an organization's technology-related strategy and infrastructure Acquiring, developing, and managing computer hardware, networks, software, and related services Developing and managing an organization's databases Analyzing data to improve an organization's marketing, operations, and strategic planning MS-ISA Program

Targeted at students with an undergraduate degree in one of the following fields: Accounting Computer science (CS) or computer-related engineering Information systems (IS) or information technology (IT) Areas of Study Cybersecurity and information assurance Data analytics (Big data) Database management and data warehousing Fraud, white collar crime and digital & financial forensics

Information system acquisition, development, and management System & network administration and security Why choose IA at UNM Information Assurance Program at UNM Anderson An AACSB accredited program A designation from the National Security Agency (NSA) and the Department of Homeland Security (DHS) as a center of academic excellence in IA education and research A partnership with the FBI and its Regional Computer Forensics Lab (RCFLA designation from the National Security

Agency (NSA) and the Department of Homeland Security (DHS) as a center of academic excellence in IA education and research A partnership with the FBI and its Regional Computer Forensics Lab (RCFL), housed at UNM, through training, and student internships and co-ops. A partnership with the Department of Energy's first satellite office for the Center for Cyber Defenders through Sandia National Laboratories. The Metro Law Enforcement Internship program Scholarship Program UNM Information Assurance Scholarship for Service

Program Pursue a Master's degree in Information Assurance at UNM. Scholarship pays all costs for three semesters: \$2000 per month stipend, all tuition & fees, book allowance, travel allowance. Customize the degree program to your background and career goals: computer & network security, computer forensics, white collar crime, auditing, and compliance. Complete a summer internship with a Federal agency in Washington, D.C.

What you can do while in school Competitions: National Collegiate Cyber Defense Competition (CCDC) and Computer and Network Vulnerability Assessment Simulation (CANVAS) Get involved with student organization Network Exploitation Security Team (NEST) Career Path

Work for government Department of Defense

National Security Agency Department of Commerce Department of Energy Department of Homeland Security Jobs titles Computer Security Specialist Database Administrators

Computer and Information Scientists Computer Support Specialists Network Systems and Data Communications Analysts The Computer Systems Administrator Computer and Information Systems Managers Management Information Systems

Directors Project Managers Local Area Network and Wide Area Network Managers Questions? Spies Like Us

Recently Viewed Presentations

• And God spake all these words, saying, (1) I am the LORD thy God[...] (2) Thou shalt have no other gods before me. Thou shalt not make unto thee any graven [engraved] image, or any likeness of anything that is...
• According to Gouveia et al (2009 and 2007, the alcoholism attitudes scale, cannabis or drugs (Simons and Carey, 2000). The scale values 1, 2, 3 and 4 represents favourable attitudes towards drugs use, 5 null point, while scores 6, 7,...
• 'Perversity' as a ground for setting aside an arbitral award, has to be examined on the touchstone of the Wednesbury principle of reasonableness. It would include a case in which (a) the findings in the award are based on no...
• one key lots of keys one monkey lots of monkeys This is a chair These are chairs This is a book These are books Singular plural Singular plural Lamp Book Bed Table Room Desk Jeep House Flower Door Tree Lion...
• Produced by liver cells and acquired through diet and natural production . Three major types: High density lipoprotein (HDL) "good cholesterol" Low density lipoprotein (LDL) "bad cholesterol" Triglycerides. Important in transfer of blood constituents (ex. lipids) Important in cell survival
• Sound, light, theatric stage movements, special effects and robot motions have all the same nature of sequences of symbolic event-related atoms. Thus the theater itself becomes a super-robot with the ability to express its emotional state through various motions, lights...
• webometrics the study of quantitative aspects of the construction and use of info. resources, structures and technologies on the Web, drawing on bibliometric and informetric approaches basic link terminology B has an inlink from A : ~ citation B has...
• High-vacuum conditions typically preclude the synchrotron analysis of liquid magnesium electrolytes, but ALS staff scientists Jinghua Guo and Per-Anders Glans-Suzuki and Toyota Scientist Timothy Arthur have developed a specialized in situ cell to study the complex electrochemical magnesium reduction process...