Items listed under "Awareness Month 2015"

Welcome to Week 3 of National Cybersecurity Awareness Month!

Welcome to Week 3 of National Cybersecurity Awareness Month. If you have been participating in the National Cybersecurity Institute’s NCSAM activities, you have probably learned a little more about cybersecurity and your role in making the world’s digital landscape a little safer....  [Read More]

Steganography: October 30 Challenge

Each steganography challenge presents an object that contains a hidden message. The object may be a block of text or the contents of a file. These challenges require creativity and some technical knowledge and skills to solve. In some cases you would...  [Read More]

Steganography: October 29 Solution

Solution to October 29 challenge Use a hexadecimal editor to examine the contents of the image file:               The hexadecimal viewer shows the 8-bit pixel values consist of only the numbers 80 and 81. These two...  [Read More]

Today in Cybersecurity: Virtualization Security

Once an organization begins employing virtualization, they become less secure unless they utilize fault tolerance to keep things running in the event of the loss of a physical server running multiple virtual machines. James Antonakos of the National Cybersecurity Institute explains. Having...  [Read More]

Today in Cybersecurity: Insider versus Outsider Threats

Threats come from inside through employees or vendors, and from the outside through hackers or infected websites. Both types of threats should be considered and policies and procedures developed for each threat. James Antonakos of the National Cybersecurity Institute explains. Having trouble...  [Read More]

Today in Cybersecurity: Physical Security

Physical security has to do with all aspects of making sure that information systems are protected from anything in their physical environment. James Antonakos of the National Cybersecurity Institute explains. Having trouble with media player? Click here to listen....  [Read More]

Steganography: October 29 Challenge

Each steganography challenge presents an object that contains a hidden message. The object may be a block of text or the contents of a file. These challenges require creativity and some technical knowledge and skills to solve. In some cases you would...  [Read More]

Steganography: October 28 Solution

Solution to October 28 challenge Take all of the following data and enter it into a spreadsheet: 0,1 0,2 0,3 0,4 0,5 1,0 1,6 2,0 2,6 3,0 3,6 4,1 4,5 6,0 6,6 7,0 7,6 8,0 8,1 8,2 8,3 8,4 8,5 8,6 9,0...  [Read More]

Steganography: October 28 Challenge

Each steganography challenge presents an object that contains a hidden message. The object may be a block of text or the contents of a file. These challenges require creativity and some technical knowledge and skills to solve. In some cases you would...  [Read More]

Steganography: October 27 Solution

Solution to October 27 challenge Given the following alphanumeric message, look up the ASCII codes for each alphanumeric symbol and write down the least significant bit: E8BMQY6 KL2FJGU WZTS4PA So, for example, an ASCII E has a hexadecimal code of 45, which...  [Read More]