Introduction to cyber security – Week 5, Cryptography

Specialised area of mathematics concerned with protecting information. Anything that can be represented as 0s and 1s can be encrypted. Applications for cryptography include: Secure banking and payment systems Protecting conversations over mobile telephones Safeguarding wireless networks Securing files on hard disks and memory keys Authenticating electronic documents Electronic voting Securing media files – Digital Rights Management (DRM) Terminology Plaintext […]

Introduction to cyber security – Week 4, Networking and Communications

What is the internet? Hierarchy of individual networks – from LANs to telephone networks. A network of networks. Two key design factors: No central controlling computer. All machines would have the same authority. Information should be deliverable along any route thereby being able to bypass machines which are unavailable. No distinct route required. How data moves Internet traffic is split […]