Aug 18, 2021 7:30 AM
Edward Pullin, Cyber Security/Date Protection
Fundamentals of Cryptography - Part 2

Ed recently shared the history of cryptography with our club. We welcome him back to discuss some techniques that malicious actors use to attempt to pierce our information shields and uncover our data. Join us and learn how to protect yourselves from the hackers who work feverishly to undermine our digital footprint.

The world has come to realize that our data is an extension of ourselves. Its health is our health, its geography is our territory. It is no accident that we use language like “anti-virus” ware to name software elements meant to protect the health of our systems, our data, our communication and our storage.  

The field of cyber-security is vast, and the importance of its value is reflected in the headlines every day. 

During this presentation, you will learn:

  • The types of cryptography
  • The role of cryptography in security
  • Everyday examples of cryptography
  • Attacks on cryptosystems