securitymatters.iu.edu
How people get your passwords | Security Matters
http://www.securitymatters.iu.edu/people-passwords-2
Security Matters - IU Center for Applied Cybersecurity Research. How people get your passwords. Posted January 10, 2012. Here’s a riddle for you: What can be short or long, tall or small, and made up of a bunch of characters? It’s a password. From upper-case letters to numbers and symbols, passwords are defined by the characters you use to make them. The first is the most obvious: They steal it. Ever enter your PIN code at the grocery store in front of other customers in line? Guessing. Study after s...
securitymatters.iu.edu
Good security questions and answers | Security Matters
http://www.securitymatters.iu.edu/good-security-questions-answers-2
Security Matters - IU Center for Applied Cybersecurity Research. Good security questions and answers. Posted February 8, 2012. In our last episode, we learned why security questions are important. Today we’re going to look at what makes a good security question, and which ones to avoid. Here are five security questions you shouldn’t answer. What is your birthday? What is your mother/father’s maiden or middle name? What is your high school mascot? What’s so bad about those questions? Is a project from the...
securitymatters.iu.edu
Security Matters | Security Matters
http://www.securitymatters.iu.edu/about
Security Matters - IU Center for Applied Cybersecurity Research. And follow us on Twitter. For updates, tips, and news. About the Center for Applied Cybersecurity Research. The Center for Applied Cybersecurity Research. Works to enhance the security and integrity of information systems, technologies, and content by facilitating research and education informed by, and integrated with, the practice of information assurance. Von Welch, Director, CACR. Leslee Cooper, Administrative Director, CACR.
securitymatters.iu.edu
Resources | Security Matters
http://www.securitymatters.iu.edu/resources
Security Matters - IU Center for Applied Cybersecurity Research. Social Networking Do’s and Don’ts. Yahoo Finance: Seven Things to Stop Doing Now on Facebook. Reclaim Privacy: A free tool that scans your Facebook privacy settings and alerts you to potential problems. Saving to Invest: Are You Using these 10 Online Financial Security Measures? Consumer Fraud Reporting: 2009 Internet Fraud, Scam, and Crime Statistics. Privacy Rights Clearinghouse: Consumers in Midwest States Can Get Free Credit Reports.
securitymatters.iu.edu
Creating strong passwords | Security Matters
http://www.securitymatters.iu.edu/creating-strong-passwords
Security Matters - IU Center for Applied Cybersecurity Research. Posted January 10, 2012. Today we’re going to talk about password strength. But before we do, let’s do an experiment. Ready? Count to six. Do you know what you just did? You just cracked the world’s most popular password! That barely edges out words like password and iloveyou as popular choices. Those are terrible passwords! So what makes a good password? Here are some tips to help you out. A good password is one that you can remember. ...
blog.vonwelch.com
Von Welch: February 2011
http://blog.vonwelch.com/2011_02_01_archive.html
Sunday, February 13, 2011. My new position at IU CACR. Late in January I started my new position at Indiana University's Center for Applied Cybersecurity Research(CACR). As Deputy Director. I'm excited about this opportunity in that I'm joining a great existing team and working with CACR's Director, Fred Cate. Who is internationally renown policy and pricacy expert. CACR has a existing education and outreach program that includes an annual cybersecurity summit. Subscribe to: Posts (Atom).
blog.vonwelch.com
Von Welch: May 2011
http://blog.vonwelch.com/2011_05_01_archive.html
Thursday, May 5, 2011. Some observations on the rekey of encrypted.google.com. This is a fairly technical post about monitoring changes in PKI infrastructure. Unless that sentence interests you, you probably don't want to read further.). Since the Comodo CA issue I've been playing around with some of the PKI monitoring infrastructure including Perspectives. And the Google Certificate Catalog. So when I heard. Then, I looked at Perspectives. Key = 94:47:cd:b3:15:94:94:0c:f5:fd:5c:1b:b7:3c:ee:ce start: Tue...
blog.vonwelch.com
Von Welch: May 2014
http://blog.vonwelch.com/2014_05_01_archive.html
Tuesday, May 27, 2014. Quantum Experiment Threat Modeling. I'm enjoying Jonathan Dowling's "Schrödinger's Killer App: Race to Build the World's First Quantum Computer. And it's interesting to read as he describes physicists eliminating not only random errors to their experiments to prove quantum effects versus hidden local variables, but even imagining intelligent, malicious ones. Ah, to be a physicist :-). Subscribe to: Posts (Atom). Quantum Experiment Threat Modeling.
blog.vonwelch.com
Von Welch: Quantum Experiment Threat Modeling
http://blog.vonwelch.com/2014/05/quantum-experiment-threat-modeling.html
Tuesday, May 27, 2014. Quantum Experiment Threat Modeling. I'm enjoying Jonathan Dowling's "Schrödinger's Killer App: Race to Build the World's First Quantum Computer. And it's interesting to read as he describes physicists eliminating not only random errors to their experiments to prove quantum effects versus hidden local variables, but even imagining intelligent, malicious ones. Ah, to be a physicist :-). Subscribe to: Post Comments (Atom). Quantum Experiment Threat Modeling.
SOCIAL ENGAGEMENT