Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged data

Rss Feed Group items tagged

sareennl

Tools boast easy cracking of Microsoft crypto for businesses - 0 views

  •  
    Summary: Cryptography specialists have developed tools to crack PPTP encryption (based on an algorithm from Microsoft), gaining access to Wi-Fi, passwords, corporate networks and data.
Collin Jackson

The Fastest-Ever Random Number Generator Conjures Digits from Subatomic Noise in a Vacuum - 0 views

  •  
    Not directly involving cryptography, but the implications of this definitely affect the field. Now that we have the capability to generate truly random number strings, our ability to encrypt data will improve.
dumessn

Is your Smart TV spying on you? | The Privacy Post | Find out how your Internet connect... - 0 views

  •  
    This was a bit surprising. More and more people are getting smart TVs so this could be a serious problem.
andrewhaygood97

Military encryption's going open -- Defense Systems - 2 views

  •  
    This makes me wonder how ethical it is for the NSA to be so heavily involved in cryptography internationally. Are they building a backdoor into these crytographic systems? If so, how ethical could that be?
charlotteneuhoff

Military Embedded Systems - 0 views

  •  
    This resource provides access to articles, news, and blog posts regarding military embedded systems, often using cryptography. One article referenced the cryptography used to secure "Data at Rest" and the length at which this information should be held secure. Is it ethical to keep this information from the public when safety is no longer a concern? At what point should these well-kept secrets become accessible?
Derek Bruff

Threat-Assessment Teams Face Complex Task of Judging Risk - The Chronicle of Higher Edu... - 0 views

  •  
    No mention of data mining in this piece from 2012, but still a useful follow-up to the Michael Morris essay on keeping college campuses safe.
aconn55

'Black Box' Software Could Be the Future of Cryptography - 2 views

  •  
    Securing data is how we currently operate, securing software could be the future of internet security.
Derek Bruff

Researchers crack the world's toughest encryption by listening to the tiny sounds made ... - 0 views

  •  
    Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening - yes, with a microphone - to a computer as it decrypts some encrypted data.
chrisr22

How the Deep Web Works - HowStuffWorks - 0 views

  •  
    What a tangled web we weave, indeed. About 40 percent of the world's population uses the Web for news, entertainment, communication and myriad other purposes [source: Internet World Stats]. Yet even as more and more people log on, they are actually finding less of the data that's stored online.
Ling Shi

Cryptography in Network Security - 2 views

  •  
    This is the e-text of a book that discusses online network encryption and application. The chapters cover various encryption methods for the transfer of data online, as well as the application of wireless, email, IP network security
Derek Bruff

Colleges are spying on prospective students by quietly tracking them across the interne... - 0 views

  •  
    Here's another angle on data mining and (prospective) college students...
estrutt

What Is SSL (Secure Sockets Layer)? | DigiCert.com - 2 views

  •  
    This website discusses procedure and purpose of encrypting sensitive data over the internet. SSL is a protocol which "determines variables of the encryption" being used to protect information from first names to credit card numbers. This website also tells you how to determine whether or not a website is secure or if your information is vulnerable. In addition, there is another page that delves into the mathematics and actual cryptography procedures behind online encryption like RSA and ECC.
masonagrow

Balancing Act: National Security and Civil Liberties in Post-9/11 Era - 2 views

  •  
    Discusses some of the points we brought up in class and provides statistics, but data is from 2013 and could potentially show the effects of events in the past two years when combined with Abbey's post
ftiet21

Class of 1984: surveillance tech creeps into the classroom (Wired UK) - 0 views

  •  
    Video camera surveillance, Biometric data collection (fingerprints), RFID Tags (monitors movement to within centimeters), Galvanic Skin Response Bracelet (monitors a child's physiological responses)
estrutt

The Domestic Surveillance Directorate - 1 views

  •  
    "The Domestic Surveillance Directorate - If you have nothing to hide, you have nothing to fear." Should the government have such free reign over our personal information, or should we be able to keep our data encrypted and hidden from the government to respect our personal rights?
Derek Bruff

On the Equifax Data Breach - Schneier on Security - 1 views

  •  
    Bruce Schneier on the Equifax hack
« First ‹ Previous 41 - 60 of 77 Next ›
Showing 20 items per page