Search Header Logo
Applications in Cybersecurity

Applications in Cybersecurity

Assessment

Presentation

Computers

University

Practice Problem

Easy

Created by

YONG IPG-Pelajar

Used 3+ times

FREE Resource

20 Slides • 7 Questions

1

Applications in Cybersecurity

media

Applications of Mathematical Models in Cryptography

Alan Sia Chou Yung, Ooi Zhi Khang, Yong Kah Wai

2

media

Cryptography

3

What is cryptography?

Cryptograph

Cryptography is like a secret code that helps keep information safe and private. Imagine you have a special secret message that you want to share with your friend, but you don't want anyone else to understand it. Cryptography helps you turn that message into a puzzle that only your friend can solve.

4

What is cryptography?

Encryption

Converting information into a secret code using algorithms.


Example: JGNNG

Decryption

Changing the secret code back into the original information.


Example: HELLO

5

What is cryptography?

Cryptography Examples:

  • Morse Code (.- .--. .--. .-.. .)

  • Caesar Cipher (FDW)

  • Number Grid Cipher (19 21 14)

  • Binary Code (01000010 01001111 01001111 01001011)

  • Mirror Writing (REGIT)

6

Open Ended

Try decryting this cryptography.

FUUQJ

7

What is cryptography

media

8

media

Coding

9

What is coding?

Coding

  • Also known as programming.

  • Process of creating instructions for computers to perform specific tasks.

  • Writing lines of text using programming languages which computers can understand and execute.

10

What is coding?

Coding

  • Set of step-by-step instructions that guide a computer to perform various operations, from simple calculations to complex tasks like running applications or website.

​Input: Programming Language

​Process:
Convert into machine code for computer to understand

Output:
Set of instructions are executed

11

Open Ended

Try making interpreting the output.

num1 = 5

num2 = 3

sum = num1 + num2

print("The sum is:", sum)

12

media

Cyber Security

13

What is Cybersecurity?

Cybersecurity

  • Practice of protecting computer systems, networks, software, and data from various threats and unauthorized access.

media

14

Open Ended

What cybersecurity protects? Or what can cybersecurity prevents?

15

What is Cybersecurity?

Network Security

  • The practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.

Information Security

  • Protects the integrity and privacy of data, both in storage and in transit.

16

What is Cybersecurity?

Data recovery

  • How to respond to a cyber-security incident or any other event that causes the loss of operations or data.

Application Security

  • Focuses on keeping software and devices free of threats.

  • Prevent pirates software and unknown files.

17

What is Cybersecurity?

Operation Security

  • The processes and decisions for handling and protecting data assets..

End-user Education

  • Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons

18

media

Applications of Cybersecurity in
Cryptography

19

Applications of Cybersecurity in
Cryptography

Secure Key Management

  • Cybersecurity ensures that cryptographic keys are generated, stored, and exchanged securely to prevent unauthorized access.

Authentication and Access Control

  • Cybersecurity mechanisms control who has access to cryptographic keys, ensuring only authorized users can use them.

20

Applications of Cybersecurity in
Cryptography

Secure Channels for Key Exchange

  • Cybersecurity protocols establish secure communication channels for exchanging encryption keys, preventing interception or manipulation.

Secure Implementation of Algorithms

  • Cybersecurity practices ensure that cryptographic algorithms are correctly implemented, free from vulnerabilities that could be exploited.

21

Applications of Cybersecurity in
Cryptography

Protection Against Side-Channel Attacks

  • Cybersecurity measures guard against attacks that exploit information leaked during cryptographic operations, such as timing or power consumption analysis.

Secure Hardware for Cryptography

  • Cybersecurity involves ensuring that the hardware used for cryptographic operations is tamper-resistant and free from backdoors.

22

Applications of Cybersecurity in
Cryptography

Key Revocation and Renewal

  • Cybersecurity processes manage the lifecycle of cryptographic keys, including revocation and renewal when keys are compromised.

Cryptanalysis and Vulnerability Assessment

  • Cybersecurity experts analyze cryptographic systems for weaknesses and vulnerabilities that could be exploited by attackers.

23

Applications of Cybersecurity in
Cryptography

Secure Transmission and Storage of Keys

  • Cybersecurity strategies protect keys during transmission and storage, preventing unauthorized access or loss.

Secure Multi-Party Computation

  • Cybersecurity techniques enable multiple parties to perform computations on encrypted data without revealing the data itself.

24

Multiple Choice

What is the use of cryptography?

1

Enhancing the speed of computer networks.

2

Creating complex computer algorithms.

3

Keeping information secure and private.

4

Generating random patterns for data analysis

25

Multiple Choice

What is the use of coding?

1

A physical process of assembling computer hardware.

2

The process of designing artistic graphics for websites.

3

The systematic act of breaking down complex problems into simpler instructions for computers.

4

The process of creating new computer programming languages.

26

Multiple Choice

What is cybersecurity?

1

Developing advanced computer hardware components.

2

Ensuring a flawless user experience in software applications.

3

Protecting digital systems and information from cyber threats.

4

Optimizing the speed and efficiency of internet connections.

27

Multiple Select

How does cybersecurity relate to cryptography? Choose all that apply.

1
  • Cybersecurity ensures that cryptographic keys are generated, stored, and exchanged securely to prevent unauthorized access.

2

Cryptography focuses on improving network speed and connectivity.

3

Cryptography helps phishing attacks and online scams.

4
  • Cybersecurity mechanisms control who has access to cryptographic keys, ensuring only authorized users can use them.

Applications in Cybersecurity

media

Applications of Mathematical Models in Cryptography

Alan Sia Chou Yung, Ooi Zhi Khang, Yong Kah Wai

Show answer

Auto Play

Slide 1 / 27

SLIDE