Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Rochester Institute of Technology

2010

Security

Articles 1 - 5 of 5

Full-Text Articles in Entire DC Network

Facilitating Rapid Response With A Relational Indicator Database Schema And Client Agents, Jason Batchelor Oct 2010

Facilitating Rapid Response With A Relational Indicator Database Schema And Client Agents, Jason Batchelor

Theses

The threat encompassing the critical computing infrastructure nations depend upon has shifted. A new dynamic of adversaries leveraging a playbook of highly sophisticated, organized, and well funded cyber attacks has emerged. These adversaries penetrate networks using exploits, tools, and techniques that are not detected by traditional client and network security software. Compromised networks stand to lose irreparable amounts of sensitive information and trade secrets if confidentiality is lost. The threat has shifted, but detection and response mechanisms have largely remained the same. They have maintained the same largely ineffective result these advanced adversaries count on.

To counter this, the development …


Wireless Security Proportional To County Development, Guillermo M. Martinez Apr 2010

Wireless Security Proportional To County Development, Guillermo M. Martinez

Theses

This paper verify the hypothesis "developed counties have a higher wireless security level than undeveloped counties", this is performed by doing a quantitative study to a group of 50 samples gathered from a war drive database. In further sections of the paper will be explained the importance of wireless security and how companies like RSA have performed studies to determinate the wireless security level of several major cities around the world.

By following the binomial test and median comparison, the reader will understand why in this paper the hypothesis was rejected. All the results indicate that no relation existed between …


Cyber Crime And Telecommunications Law, Robert Imhof Jan 2010

Cyber Crime And Telecommunications Law, Robert Imhof

Theses

Cyber crime is a new and emerging area of concern for technology professionals, business leaders, and heads of government. This research takes a look at the individuals behind these crimes in order to develop a profile and determine emerging trends. Classical Sociological theory is detailed and its ability to apply to modern cyber crime is explained. Interviews were conducted with five professionals in the field in order to gain a wide range of differing experiences and emerging trends. The most important cyber crime laws in the United States Code were broken down into their elements and explained in a way …


A Social Approach To Security: Using Social Networks To Help Detect Malicious Web Content, Michael Robertson Jan 2010

A Social Approach To Security: Using Social Networks To Help Detect Malicious Web Content, Michael Robertson

Theses

In the past six years, tremendous growth in the size and popularity of social networking has fundamentally changed the way we use the Internet. As social aspects to the Internet continue to expand in both quantity and scope, security of the users of social networking sites and the data generated by them will ultimately become an unavoidable concern. This is a realization that malicious users have already had, as viruses, spyware, and phishing scams continue to propagate through social networks at an alarming rate. It is now becoming increasingly critical that the average user also understands this potential for the …


Securing The It Acquisition Security Chain: Security Concerns And Human Factors In It Acquisition, Eric Goldman Jan 2010

Securing The It Acquisition Security Chain: Security Concerns And Human Factors In It Acquisition, Eric Goldman

Theses

This thesis research evaluates the extent to which IT decision makers consider security concerns and requirements while performing technology acquisition in small-to-medium sized organizations. The research sought to understand what factors influence decision maker attitudes on the role of security during acquisition and how these attitudes and decision strategies affect security throughout the system lifecycle. Through an interview based study, with fifteen IT decision makers from small-to-medium sized organizations, decision maker attitudes and organizational practices were evaluated. The findings suggest that security is not often considered during the acquisition process and is not a crucial element of acquisition decision and …