8000 GitHub - jclingensmith/infosec-for-analysts: Materials for workshops on information security for data analysts
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

jclingensmith/infosec-for-analysts

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

30 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

infosec-for-analysts

Materials for workshops on information security for data analysts.

I'll use this repo to host presentations, notes, and resource lists as we continue to develop this material over time.

Resources

Threat models and mental frameworks

Ars Technica's explanation of why threat models are useful for everyone is a good introduction to thinking about security.

The 2016 Uber hack is pretty much a perfect model of how to do everything wrong. I'll have a bunch more resources on each piece of this hack, but How to Prevent the Uber Hack: 5 Defensive Tactics is a decent place to start.

Cryptography

If I went through the basics of the Alice/Bob/Eve setup too fast, there's a nine-minute video describing Alice and Bob's problem and how cryptography is supposed to solve it

A quick primer on what HTTPS does, and a good explanation of the way the encryption sequence between unfamiliar communication partners on the internet generally works.

A much more complete resource list on some of the basic concepts in cryptography

If you really like slides and you want way better ones than mine, check this enormous slide deck from an Intro Cryptography course at UC-San Diego.

News articles and why encryption stuff is important

One of the founders of WhatsApp walked away from close to a billion dollars, in part because of a disagreement about who should hold the decryption keys: WhatsApp uses end-to-end (client-side) encryption. That means Facebook can't see WhatsApp messages, and therefore can't monetize them.

A news story from November 2018 illustrating how crypto is hard and you shouldn't trust somebody just because they charge tons of money and give themselves a tough-sounding name: "Police decrypt 258,000 messages after breaking pricey IronChat crypto app"

RSA encryption

RSA is one of the most important asymmetric cryptosystems. How RSA Works (With Examples)

A somewhat more terse description of how RSA works

A little walkthrough implementing RSA encryption in R: Fun with bignum: how RSA encryption works

End-to-end encryption

The stylized Alice/Bob/Eve setup doesn't take into account that Alice and Bob may be using some third-party service that connects them, like Gmail, Facebook, or WhatsApp. End-to-end encryption (aka client-side encryption) is an encryption system that doesn't let that third-party service see the contents of messages. The current best-practice system for E2EE is the Signal protocol: Demystifying the Signal Protocol for End-to-End Encryption

Man-in-the-middle attacks

MitM attacks are one of the main reasons you don't trust wifi in airports, hotels, etc. When Eve can impersonate Alice and/or Bob and collect (or change) the details of their conversation, she's committing a MitM attack. The security company Rapid7 has a slightly tech-y description of how MitM attacks actually happen in the real world and what we're supposed to do about them. Man-in-the-Middle (MITM) Attacks: Techniques and Prevention

End-User Security

Passwords

Ars Technica's How I Became a Password Cracker is a 2013 classic that walks through just how easy it is to learn to crack passwords. The follow-up, Anatomy of a Hack demonstrates how seemingly good passwords are susceptible.

About

Materials for workshops on information security for data analysts

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • HTML 100.0%
0