Eksperimenti u blogovanju| Hobi| IT| Nauka| Zabava

Enigma

Dragan Pleskonjic RSS / 20.09.2012. u 12:56

Stiglo pismo, ali nije otvoreno nego šifrovano. U napomeni stoji da je poučno. Hajde da se zabavimo i da ga otvorimo tj. dešifrujemo.

Evo sadržaj pisma:

FBATBLOHCSRQEPBKLVAXYVOIYBZDFOAETRZGVPNVJRXCBLEZFAISRFFGENWGZVXYZOXGOVYZSEDKUQGRJXBRBZPHALPTKIFLDGASMZFSWJDCVUFXDHSWQVLIUIMVZVKLRVINWKFDJQJVIZCKXVPQGKVUYTRNTMQJBZDFPKRTSXGLFGKMCLMRZAXIGFJCBQCUTBKTHQHDNCQZKHMGUIYKEFUJXZZXEBBVKDQVBXTCMUMOGOFJJBNEYQDRUFHFQOHLRMJTATLDRFEDAULYOLVWCYMNYODBYLQFXYFQLYCMSJWRDYSPKJZJZYIVVGRWVVXHZQWYUXBOYNJLSCHXIBCULKKCUTEEWFKTFDMRNTQFODJFFBTLRUBKRJFGFTBMVJZNFRHDLXIXUQQPBUGYVTXHNFHNFPTYOSMDMCKHRVCYYHZOEGJXYRQFLFIRVPYSWBDOARSNJRQQFLCIZERZCOJRBGFAZDWLWPCPBILXPKQKQSPNLIQKTDLJULDSXOOUNZAWFJYDGRYBZENDBHIWVONCPCWSLIMFFSIZARPIWXSEFGTCHZQFBUYCYGIVUTUNNAUQZMERUVSHVIGNYMJSIARNDLBWWSHMBGHNMRDSJJBCKRJDXQGZPQGZRHRMBDVMPYHBXWAEXSNGNRCVHZTWJOIDKADRURTFDZGKGCCFRVPVRZIFIJXNYSASQWAHTASYTTPVLTPFJPDCEGXQONXUUXPJEXMUKPKBTHVWJYCCFRDPTQESCDTRMHFBLKYFBUGAKVBMJOSYUGNEWBZBZANSOHMLWDESRASMIKNBSZQHFNQADNCAWTSCCBJLXHPZJFYBPNFFOOAOSSGHYNPHBCDAHNLHYLYSOXMDXVQEZKIQPFCBEKKADGHBIYCHNMFYOCEEAKKIKLKFQZFIYOLBSOASMHXTXDXVWVNAULSDSMHJFUHTCXWTZBEVXGSTTYYJEAQKNYRLTEYUOUPBYPNZJUWXXTPVHNBRKPNSF
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

The Weakest Link
The Weakest Link

Napomene:

- Maksa mi je sugerisao ovu izuzetnu ilustraciju. Hvala!

- Informacije su tu negde.

*****

Edit: 21.09.2012. u 22:25

Rešenje

All security is a weakest link problem. Employers have to trust their workers; there is no reasonable alternative. However, all too often, employers fail to realize that risks posed by trusted personnel are highly dynamic and must be actively managed. Often, employers assess employee risk only once - at the time of hire. Unfortunately, employees with decades of tenure are capable of the unthinkable if they're having trouble making the mortgage payment next month. Moreover, as employees' roles' change, their access to sensitive information and level of supervision must be re-evaluated to actively manage the acceptable level of risk.

As the Information Age generations make up more and more of the workforce, their perspectives risk devaluing information as a proprietary resource. Problems arise when employees treat data casually, sharing widely, emailing socially, and taking valuable information with them when they leave.

When a security mechanism presents a standard "hard" way through and an alternative "easier" way through, the bad guys will always target the easy way.

In the cybersecurity world, automated ("self-service") password reset mechanisms are the norm and are a perfect example of this phenomenon. They're used because they are quick, economical and convenient for both the account issuer and the user. We've all used them - click the "I forgot my password" button and I'm either sent an email or prompted to answer a few personal questions. Unfortunately, the security of the alternate (reset) mechanism is often weaker than the password, and as such the reset mechanisms have become attractive targets. Just ask the numerous Hollywood starlets that have recently had their mobile accounts compromised via this mechanism. Social networking sites have made it easy for bad guys to guess the answers to common "personal security questions" such as the name of your street growing-up, high school mascot, etc.

In any system where humans play an integral role, vulnerabilities due to human nature will permeate. Any realistic security system creates redundancies and redoubts that address both technical and human vulnerabilities.

***** 

Kao dodatak i ilustracija:

Article about a kid who was/is part of the UGNazi hacking group and his participation in "social engineering":

Cosmo, the Hacker ‘God' Who Fell to Earth

Thanks to my colleague Matt Linney.

*****

Atačmenti



Komentari (107)

Komentare je moguće postavljati samo u prvih 7 dana, nakon čega se blog automatski zaključava

vishnja92 vishnja92 16:15 22.09.2012

Re: Mislim

Dakle koksy mi je skratila posao bar 10 puta vremenski.



zivot je pun neocekivanih preokreta
Hansel Hansel 16:55 22.09.2012

Re: Mislim

Dragan Pleskonjic
Postupak se zove kriptoanaliza. Veština vrlo bitna i cenjena i ima svoju posebnu logiku. Neke šifre se mogu "razbiti" sa malo napora, neke sa malo više, a neke gotovo nikako sa sadašnjim nivoom razvoja nauke i tehnike.

Jasno, to nisam ni dovodio u pitanje - prosto postoje razrađeni principi, koji su, naravno, zasnovani na logici (kao takvoj ).

A gotovo ključni momenat je - strpljenje:
disident79
Što se ovog konkretnog tiče trebalo mi je 20minuta sa datim softverom, a drastično ga je ubrzalo to što sam kucao samo F čekajući izlaz A, a kada se pojavi A još 3-4 slova (FBAT - ALLS). Dakle koksy mi je skratila posao bar 10 puta vremenski.

koksy koksy 17:40 22.09.2012

Re: Mislim

vishnja92
Dakle koksy mi je skratila posao bar 10 puta vremenski.



zivot je pun neocekivanih preokreta


okej, ako ja dobro kužim, jedan generalni zaključak bi bio da sam ja jedno nadbiće.
od gorštaka očekujem da pokrene inicijativu za 1 masovni doček mene pred skupštinom grada.

ali - pustimo sad to (ako me se sete - sete). drugi - doduše, manje važan - zaključak je da smo bez draganove navigacije mogli vrteti one točkiće do navek-i-dan-posle, i opet se ne bi makli s mesta.
al' ono, baš zarazno majku mu...
Dragan Pleskonjic Dragan Pleskonjic 18:55 22.09.2012

Re: Mislim

Za zainteresovane:

- jedan simetrični algoritam: Advanced Encryption Standard (AES)

- i jedan asimetrični: RSA Algorithm.

Besplatna knjiga za ljubitelje kriptografije: Handbook of Applied Cryptography.

Dragan Pleskonjic Dragan Pleskonjic 19:09 22.09.2012

Re: Mislim

gorstak92 gorstak92 09:44 24.09.2012

Re: Mislim

okej, ako ja dobro kužim, jedan generalni zaključak bi bio da sam ja jedno nadbiće.
od gorštaka očekujem da pokrene inicijativu za 1 masovni doček mene pred skupštinom grada.


Izvinjavam se što kasnim na čas.
Bio sam na nekom roštilju sa blogerima za vikend pa mi se učinilo kao da sam bio na blogu. Skroz sam zaboravio na ovo preko interneta.

Dakle,
Naš šampion za školsku 2012/2013 je K O K S Y!!!
Neka peva ova medijska kuća
nek se kolo zaigraaaaa!!!


P.S. Koksy, sad kad CIA čuje kako dešifruješ ima da te deportuju dok kažeš "All security is a weakest link problem". Čuo sam da je živi smor tamo u Gvantanamu, a nije loše ako te deportuju u Kvantiko. Sve zavisi ko ti bude radio na papirima.
Da sam na tvom mestu tražio bih politički azil od República del Ecuador.
koksy koksy 17:40 24.09.2012

Re: Mislim

gorstak92
okej, ako ja dobro kužim, jedan generalni zaključak bi bio da sam ja jedno nadbiće.
od gorštaka očekujem da pokrene inicijativu za 1 masovni doček mene pred skupštinom grada.



Dakle,
Naš šampion za školsku 2012/2013 je K O K S Y!!!


kako čovek da se ne složi s tobom!

Da sam na tvom mestu tražio bih politički azil od República del Ecuador.


važi. idem prvo da kresnem dve-tri šveđanke.

Arhiva

   

Kategorije aktivne u poslednjih 7 dana