Keeping Secrets - Cryptography in a Connected World

Keeping Secrets - Cryptography in a Connected World

World Science Festival via YouTube Direct link

How do we establish cyber security?

11 of 18

11 of 18

How do we establish cyber security?

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Keeping Secrets - Cryptography in a Connected World

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Cryptography In A Connected World
  2. 2 Josh Zepps Introduction
  3. 3 Participant Introductions
  4. 4 What is the history of Cryptography?
  5. 5 What's the difference between Cryptography and Encryption?
  6. 6 How the enigma machine works.
  7. 7 You’re Only as Secure as Your Weakest Link
  8. 8 Public key and private key encryption example.
  9. 9 What is the distinction between hacking and cryptanalysis?
  10. 10 The NSA and what they are looking for?
  11. 11 How do we establish cyber security?
  12. 12 How do systems get broken into?
  13. 13 How do you break a code?
  14. 14 Public key and the key distribution problem.
  15. 15 Codes will need to be tough due to mathematicians getting better.
  16. 16 The cloud and how we protect it.
  17. 17 In a world that is increasingly networked, How do we protect ourselves?
  18. 18 Online voting ... When and how?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.