Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
-
- Open Access Dissertations (2)
- Australian Digital Forensics Conference (1)
- CCE Theses and Dissertations (1)
- Electronic Theses and Dissertations (1)
- Journal of Cybersecurity Education, Research and Practice (1)
-
- Leila A. Halawi (1)
- Master's Theses (2009 -) (1)
- Open Access Theses (1)
- Publications (1)
- The African Journal of Information Systems (1)
- The STEAM Journal (1)
- Turkish Journal of Electrical Engineering and Computer Sciences (1)
- UBT International Conference (1)
- Walden Dissertations and Doctoral Studies (1)
- Publication Type
Articles 1 - 15 of 15
Full-Text Articles in Physical Sciences and Mathematics
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Threats To Information Protection - Industry And Academic Perspectives: An Annotated Bibliography, Michael E. Whitman, Herbert J. Mattord
Journal of Cybersecurity Education, Research and Practice
Threats to information assets have always been a concern to those responsible for making information useful and defending its value. The concepts of threat, threat agent, threat events and threat sources have evolved in recent years have very precise definitions. A summary of threat classification models used in academic research is provided along with a summary of recent industry threat assessment reports. Finally, the results from a recent study, 2015 SEC/CISE Threats to Information Protection Report Including a Current Snapshot of the State of the Industry, are given.
Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur
Computational Environment For Modeling And Analysing Network Traffic Behaviour Using The Divide And Recombine Framework, Ashrith Barthur
Open Access Dissertations
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding the nature of blacklisted hosts over time.
The analytical environment enables deep analysis of very large and complex datasets by exploiting the divide and recombine framework. The capability to analyse data in depth enables one to go beyond just summary statistics in research. This deep analysis is …
An Interview With The Scorpion: Walter O’Brien, Walter O'Brien
An Interview With The Scorpion: Walter O’Brien, Walter O'Brien
The STEAM Journal
An interview with Walter O'Brien (hacker handle: "Scorpion"), known as a businessman, information technologist, executive producer, and media personality who is the founder and CEO of Scorpion Computer Services, Inc. O'Brien is also the inspiration for and executive producer of the CBS television series, Scorpion.
Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani
Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani
UBT International Conference
The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a …
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Leila A. Halawi
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
Packet Filter Performance Monitor (Anti-Ddos Algorithm For Hybrid Topologies), Ibrahim M. Waziri
Packet Filter Performance Monitor (Anti-Ddos Algorithm For Hybrid Topologies), Ibrahim M. Waziri
Open Access Dissertations
DDoS attacks are increasingly becoming a major problem. According to Arbor Networks, the largest DDoS attack reported by a respondent in 2015 was 500 Gbps. Hacker News stated that the largest DDoS attack as of March 2016 was over 600 Gbps, and the attack targeted the entire BBC website.
With this increasing frequency and threat, and the average DDoS attack duration at about 16 hours, we know for certain that DDoS attacks will not be going away anytime soon. Commercial companies are not effectively providing mitigation techniques against these attacks, considering that major corporations face the same challenges. Current security …
Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde
Monitoring Dbms Activity To Detect Insider Threat Using Query Selectivity, Prajwal B. Hegde
Open Access Theses
The objective of the research presented in this thesis is to evaluate the importance of query selectivity for monitoring DBMS activity and detect insider threat. We propose query selectivity as an additional component to an existing anomaly detection system (ADS). We first look at the advantages of working with this particular ADS. This is followed by a discussion about some existing limitations in the anomaly detection system (ADS) and how it affects its overall performance. We look at what query selectivity is and how it can help improve upon the existing limitations of the ADS. The system is then implemented …
A Framework To Manage Sensitive Information During Its Migration Between Software Platforms, Olusegun Ademolu Ajigini, John Andrew Van Der Poll, Jan H. Kroeze Phd
A Framework To Manage Sensitive Information During Its Migration Between Software Platforms, Olusegun Ademolu Ajigini, John Andrew Van Der Poll, Jan H. Kroeze Phd
The African Journal of Information Systems
Software migrations are mostly performed by organisations using migration teams. Such migration teams need to be aware of how sensitive information ought to be handled and protected during the implementation of the migration projects. There is a need to ensure that sensitive information is identified, classified and protected during the migration process.
This paper suggests how sensitive information in organisations can be handled and protected during migrations, by using the migration from proprietary software to open source software to develop a management framework that can be used to manage such a migration process. The research employed a sequential explanatory mixed …
Evaluating The Gasday Security Policy Through Penetration Testing And Application Of The Nist Cybersecurity Framework, Andrew Nicholas Kirkham
Evaluating The Gasday Security Policy Through Penetration Testing And Application Of The Nist Cybersecurity Framework, Andrew Nicholas Kirkham
Master's Theses (2009 -)
This thesis explores cybersecurity from the perspective of the Marquette University GasDay lab. We analyze three different areas of cybersecurity in three independent chapters. Our goal is to improve the cybersecurity capabilities of GasDay, Marquette University, and the natural gas industry. We present network penetration testing as a process of attempting to gain access to resources of GasDay without prior knowledge of any valid credentials. We discuss our method of identifying potential targets using industry standard reconnaissance methods. We outline the process of attempting to gain access to these targets using automated tools and manual exploit creation. We propose several …
Leveraging Client Processing For Location Privacy In Mobile Local Search, Wisam Mohamed Eltarjaman
Leveraging Client Processing For Location Privacy In Mobile Local Search, Wisam Mohamed Eltarjaman
Electronic Theses and Dissertations
Usage of mobile services is growing rapidly. Most Internet-based services targeted for PC based browsers now have mobile counterparts. These mobile counterparts often are enhanced when they use user's location as one of the inputs. Even some PC-based services such as point of interest Search, Mapping, Airline tickets, and software download mirrors now use user's location in order to enhance their services. Location-based services are exactly these, that take the user's location as an input and enhance the experience based on that. With increased use of these services comes the increased risk to location privacy. The location is considered an …
An Efficient Robust Watermarking Scheme For Varying Sized Blocks, Navneet Yadav, Kulbir Singh
An Efficient Robust Watermarking Scheme For Varying Sized Blocks, Navneet Yadav, Kulbir Singh
Turkish Journal of Electrical Engineering and Computer Sciences
No abstract provided.
Development Of A Cybersecurity Skills Index: A Scenarios-Based, Hands-On Measure Of Non-It Professionals' Cybersecurity Skills, Melissa Carlton
Development Of A Cybersecurity Skills Index: A Scenarios-Based, Hands-On Measure Of Non-It Professionals' Cybersecurity Skills, Melissa Carlton
CCE Theses and Dissertations
Completing activities online are a part of everyday life, both professionally and personally. But, conducting daily operations, interacting, and sharing information on the Internet does not come without its risks as well as a potential for harm. Substantial financial and information losses for individuals, organizations, and governments are reported regularly due to vulnerabilities as well as breaches caused by insiders. Although advances in Information Technology (IT) have been significant over the past several decades when it comes to protection of corporate information systems (IS), human errors and social engineering appear to prevail in circumventing such IT protections. While most employees …
Memory Forensic Data Recovery Utilising Ram Cooling Methods, Kedar Gupta, Alastair Nisbet
Memory Forensic Data Recovery Utilising Ram Cooling Methods, Kedar Gupta, Alastair Nisbet
Australian Digital Forensics Conference
Forensic investigations of digital devices is generally conducted on a seized device in a secure environment. This usually necessitates powering down the device and taking an image of the hard drive or semi-permanent storage in the case of solid state technology. Guidelines for forensic investigations of computers advise that the computer should be shut down by removing the power supply and thereby maintaining the hard disk in the state it was in whilst running. However, valuable forensic evidence often exists in the volatile memory which is lost when this process is followed. The issues of locked accounts on running computers …
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman
Publications
Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …
Examining Data Privacy Breaches In Healthcare, Tanshanika Turner Smith
Examining Data Privacy Breaches In Healthcare, Tanshanika Turner Smith
Walden Dissertations and Doctoral Studies
Healthcare data can contain sensitive, personal, and confidential information that should remain secure. Despite the efforts to protect patient data, security breaches occur and may result in fraud, identity theft, and other damages. Grounded in the theoretical backdrop of integrated system theory, the purpose of this study was to determine the association between data privacy breaches, data storage locations, business associates, covered entities, and number of individuals affected. Study data consisted of secondary breach information retrieved from the Department of Health and Human Services Office of Civil Rights. Loglinear analytical procedures were used to examine U.S. healthcare breach incidents and …