Symmetric Cryptography
- Cereal box decoder ring example and handout
- ROT13 / Caesar cipher
- Unix CLI examples
Math review
- Prime numbers
- Exponents
- Modulus
Asymmetric Cryptography
- keypairs and how they are used
- RSA dumbed down
- RSA decod...
A new approach to operational security models is needed. Too much sensitive data is being lost and that places enterprises at grave risk. This session will focus on how the introduction and utilization of commercial threat intelligence feeds and ser...
Cell phones, PDAs and computers have transformed life by allowing people to work and stay connected virtually anywhere. People are consuming three times as much information as they did a generation ago, but does this constant stream of stimuli come ...
Brookdale has been getting by with a datacenter built decades ago when it consisted of a mainframe with limited capability. The mainframe is long gone and replaced with servers now providing a much wider range of services. Brookdale came to the real...
In today’s security environment, can we truly define ‘trusted’ and ‘untrusted’ devices, networks or users? What we are hearing from manufacturers, industry analysts and customers is a resounding NO. The security community is responding by ...