Encryption plays a major role in the flow of sensitive information on the Internet. Most of us are unaware of what encryption is or what role it plays in our everyday online existence. The next time you are sitting at your computer, on Google Chrome or Firefox browser, notice the tiny lock next the URL or the address of the site you are on. That lock means your connection is secure and encrypted. Unlike the words on this page, what is transmitted through the Internet looks more like this "WTq8zYcZfaWVvMncigHqwQ", with differing encryption strengths and acronyms such as AES and RSA. What you type is encrypted when you press enter and is decrypted at your destination server back into English.
November is Native American Heritage Month, honoring the culture and contributions of Native Americans. Starting in World War I but primarily during World War II, Native American soldiers fluent in both English and tribal languages were enlisted as Code Talkers. Code talking is a form of encryption, used before computers took over with increasingly complex methods. Code talkers were assigned in pairs, one at each end of the conversation, using Native American words to essentially encrypt secret messages and keep them out of the hands of the enemy. Initially a Native language word was used for each letter of the English Alphabet, for example the letter A would be encrypted as "wo-la-chee" in Navajo. Later sophistication combined direct translation of English words into Native words. The code they developed remained unbroken through the end of WWII.
Code talkers from at least 14 Native nations including Navajo, Choktaw, Cherokee, Lakota and Cree were enlisted by different branches of the military. They had to keep their work secret and didn't receive recognition of their contribution to the war effort until information was declassified in 1968. Among several recognition ceremonies in the years since, the original 29 World War II Navajo code talkers were honored and presented with the Congressional Gold Medal in 2000.
Microsoft Security Intelligence has found that as of September 7, 2020, out of the nearly 8.7 million malware encounters reported in the last 30 days, 59.84% came from the education sector, making it the most affected sector.A few days ago the campus was the target of an executive SpearPhishing campaign. The campaign used a new approach, Onedrive.
An actual executive's name was listed as the originator of the file and the Microsoft branding was correct. It is short and counts on you reading and clicking quickly. Even the sender's email address looked legitimate: "sharepointonline.com"
Executive SpearPhishing can be designed to get you to react quickly and this is a sophisticated example. Please make sure if you receive an email like the above that you forward it immediately to firstname.lastname@example.org and do not click on any link.
Our last class looked at the new features in the October update to Windows 10 - Check out the video
Our next class on November 21st will be a brand new version of ITS Jeopardy (in memory of Alex Trebek)
For more information, or to be added to the distribution list, send an email to email@example.com
Help us grow our Social Networking
For conversations about the latest in technology, unique training content and the occasional picture of puppies, help us grow our social media presence. Your clicks, your shares and your subscribes are appreciated.
As a reminder, the Cal Lutheran Help Desk is staffed and operational. If you have any questions or concerns about IT related matters or a suspicious email, don't hesitate to contact the Help Desk at 805-493-3698 or firstname.lastname@example.org
California Lutheran University | United States | 805-493-3551
Copyrights all rights reserved