DOC PREVIEW
SU IST 195 - Cryptography
Type Lecture Note
Pages 2

This preview shows page 1 out of 2 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 2 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

IST 195 1st Edition Lecture 7 Outline of Last Lecture I. Why is Big Data Helpful?a. The Four V’sII. Where does Big Data Come From?III. The Beginning of DataIV. Issues with Big DataV. Types of Big Data Outline of Current Lecture VI. StenographyVII. CryptographyVIII. AuthenticationIX. Data ThefCurrent LectureSteganography - steganography - hiding a message in another message - usually in plain site, as long as the sender and the receiver both know how it's hidden it can be successful - in 2010, there were images uncovered by the FBI that had text messages into them and posted on public websites hidden by Russian spies Cryptography - cryptography - scrambling data so it is unreadable; based on math algorithms o Kryptos wall of the CIA is a real life example of encryption - encryption technique - scrambling up the information to hide the message - decryption technique - unscrambling the information to uncover message o encryption key - the password o cipher text - the encrypted text, the disguise o clear text - the unscrambled message - symmetric cryptosystem - single key, less secure, used on the web - ex. if everyone is given a key then someone goes rogue, the key is out there for anyone - asymmetric cryptosystem - uses one key to encrypt and decrypt, more secure - key - the password used to hide and reveal your cypher text - substitution - shifing the code over to encrypt the message - transposition - message is encrypted by moving small pieces of it around These notes represent a detailed interpretation of the professor’s lecture. GradeBuddy is best used as a supplement to your own notes, not as a substitute.Authentication - multifactor authentication - not just relying on a username and/or password, helping out security (based on something you know, have or are) Data Thef - Point of Sale Hack - databases are very hard to break into, so as credit cards are being swiped theinformation is also being sent to a hacker (ex. Target and Home Depot) - monitor your


View Full Document

SU IST 195 - Cryptography

Type: Lecture Note
Pages: 2
Download Cryptography
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Cryptography and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Cryptography 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?