🎙 Welcome to Episode 3 of the BCIS 4345: Network and System Security Podcast, hosted by Dr. Joseph H. Schuessler from the Dr. Sam Pack College of Business at Tarleton State University.
In this episode, we explore the fundamentals of cryptography—the science of securing data through algorithms and keys. From hashing and symmetric/asymmetric encryption to blockchain applications and the emerging challenges of quantum computing, this discussion highlights how cryptography is both a powerful defense and a system with limitations attackers seek to exploit.
Based on the text:
Ciampa, M. (2025). CompTIA Security+ Guide to Network Security Fundamentals (8th ed.). Cengage. https://www.cengage.com/c/new-edition/9798214000787/
📘 Created with NotebookLM, Google’s AI-powered research assistant that integrates your course content into a connected learning experience.
🔗 Explore the interactive notebook:
NotebookLM Companion https://notebooklm.google.com/notebook/2401923e-53f0-4d8e-a893-1e0732bed9ee?artifactId=2bad09d5-fe9d-45e9-811d-0576e639c3d0
🔗 For questions regarding this course, please reach out to Dr. Schuessler's Teaching Assistant:
https://chatgpt.com/g/g-68a8751d22788191a9e0733bd9f44bf9-bcis-4345-network-and-systems-security
🔍 Key Topics Covered:
🔐 Defining Cryptography – Hiding messages vs. hiding meaning (steganography vs. encryption)
🔑 Cryptographic Algorithms – Hashing, symmetric (AES, 3DES, RC, Blowfish, Twofish), asymmetric (RSA, ECC, DSA)
💾 Software & Hardware Encryption – File system encryption, BitLocker, self-encrypting drives, HSMs, TPMs, and TEEs
📊 Blockchain Security – Immutable ledgers and SHA-256 in distributed trust
⚠️ Cryptographic Limitations & Attacks – Key length, weak keys, algorithm attacks, collisions, birthday attacks
⚛️ Quantum Computing Threats – Quantum cryptography, quantum communication, and post-quantum defenses
🎓 CompTIA Security+ Alignment – Core cryptography knowledge for IT, MIS, and CIS majors entering cybersecurity careers
📺 Watch the Full BCIS 4345 Series:
BCIS 4345 Playlist https://www.youtube.com/playlist?list=PLRU5YMNncPaot28FOZlxoDIDuluj45y9g
🔗 Explore More BCIS Podcasts You May Like:
• https://www.youtube.com/playlist?list=PLRU5YMNncPaqUbrPJXlS1t1YIOOIbwwCm
• https://www.youtube.com/playlist?list=PLRU5YMNncPaob4xqmqrx5_VyvYvfc54xW
• https://www.youtube.com/playlist?list=PLRU5YMNncParSkh1iYUHD4weh4qvpXrwR
• https://www.youtube.com/playlist?list=PLRU5YMNncPaqM6860sJUUlL0PCEyggK_K
• https://www.youtube.com/playlist?list=PLRU5YMNncPapL3JvXOaiVNckBY3-0JNQS
• https://www.youtube.com/playlist?list=PLRU5YMNncPaoOozvXkDTSY1iqjsC42n4u
• https://www.youtube.com/playlist?list=PLRU5YMNncPaqN14zaj_InWi8R8w9qhjTt
👍 If this episode helped you understand the foundations of cryptography and its role in cybersecurity, like, subscribe, and share with classmates.
🛎 Turn on notifications to follow along with the full series.
🗨️ Discussion Prompt: Do you think quantum computing will completely break current encryption methods, or will post-quantum cryptography keep us secure? Why?