1 of 81

An Introduction to Cybersecurity

David J. Malan

malan@harvard.edu

2 of 81

If you need Wi-Fi

Network: @JIS-Guest

Username: cs50x�Password: CS50XJIS

3 of 81

open

pollev.com/cs50

on your phone

🤓

4 of 81

open this URL on your phone

5 of 81

An Introduction to Cybersecurity

David J. Malan

malan@harvard.edu

6 of 81

Halo semuanya, nama saya David Malan

7 of 81

Terima Kasih

8 of 81

open

pollev.com/cs50

on your phone

🤓

9 of 81

10 of 81

secure

11 of 81

passwords

12 of 81

  1. 123456
  2. @Nandar001
  3. 12345678
  4. 123456789
  5. password
  6. coba12345
  7. 12345
  8. moons21
  9. bismillah
  10. 123

13 of 81

brute-force attacks

14 of 81

15 of 81

16 of 81

4-digit passcode

17 of 81

10 × 10 × 10 × 10

18 of 81

10,000

19 of 81

4-letter passcode

20 of 81

52 × 52 × 52 × 52

21 of 81

7,311,616

22 of 81

4-character passcode

23 of 81

94 × 94 × 94 × 94

24 of 81

78,074,896

25 of 81

8-character passcode

26 of 81

94 × 94 × 94 × 94 × 94 × 94 × 94 × 94

27 of 81

6,095,689,385,410,816

28 of 81

29 of 81

30 of 81

31 of 81

32 of 81

33 of 81

34 of 81

two-factor authentication

35 of 81

36 of 81

37 of 81

keyloggers

38 of 81

SSO

39 of 81

40 of 81

password managers

41 of 81

  • Credential Manager
  • Keychain�
  • 1Password
  • LastPass
  • ...

42 of 81

encryption

43 of 81

secret-key encryption

44 of 81

45 of 81

T H I S I S C S 5 0

46 of 81

U H I S I S C S 5 0

47 of 81

U I I S I S C S 5 0

48 of 81

U I J S I S C S 5 0

49 of 81

U I J T I S C S 5 0

50 of 81

U I J T J S C S 5 0

51 of 81

U I J T J T C S 5 0

52 of 81

U I J T J T D S 5 0

53 of 81

U I J T J T D T 5 0

54 of 81

public-key encryption

55 of 81

56 of 81

https://

57 of 81

end-to-end encryption

58 of 81

59 of 81

60 of 81

61 of 81

62 of 81

storage

63 of 81

64 of 81

65 of 81

66 of 81

67 of 81

68 of 81

69 of 81

70 of 81

full-disk encryption

71 of 81

  • BitLocker
  • FileVault�
  • ...

72 of 81

ransomware

73 of 81

incognito mode

74 of 81

75 of 81

Homework

  1. Use a password manager
  2. Use two-factor authentication
  3. Use (end-to-end) encryption

76 of 81

77 of 81

U I J T X B T D T 5 0

78 of 81

T H I S X B T D T 5 0

79 of 81

T H I S W A S D T 5 0

80 of 81

T H I S W A S C S 5 0

81 of 81

An Introduction to Cybersecurity

David J. Malan

malan@harvard.edu