Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2011

School of Computer & Information Science

Articles 1 - 30 of 32

Full-Text Articles in Physical Sciences and Mathematics

The Vulnerability Assessment And Penetration Testing Of Two Networks, Steven L. Simpson Dec 2011

The Vulnerability Assessment And Penetration Testing Of Two Networks, Steven L. Simpson

Regis University Student Publications (comprehensive collection)

Vulnerability assessments and penetration testing are two approaches available for use by internet security practitioners to determine the security posture of information networks. By assessing network vulnerabilities and attempting to exploit found vulnerabilities through penetration testing security professionals are able to evaluate the effectiveness of their network defenses by identifying defense weaknesses, affirming the defense mechanisms in place, or some combination of the two. This project is a discussion of the methods and tools used during the vulnerability assessment and penetration testing, and the respective test results of two varied and unique networks. The assessment and testing of the first …


An Analysis Of User-Centric Identity Technology Trends, Openid's First Act, Peter Motykowski Nov 2011

An Analysis Of User-Centric Identity Technology Trends, Openid's First Act, Peter Motykowski

Regis University Student Publications (comprehensive collection)

Identity technologies within Internet applications have evolved at an aggressive pace over the past decade. As a result, a variety of user-centric identity management technologies are available on the Internet today. The user-centric identity technology realm has become a fragmented ecosystem of standards, techniques, and technical approaches to identity management. A symptom of this fragmentation is the sluggish adoption of user-centric identity technologies by Internet users. A study titled, An Analysis of User-Centric Identity Technology Trends, OpenID"â„¢s First Act, aims to reveal identity technology adoption patterns of users that engage in the use of Internet applications secured by an authentication …


Data Warehouse And Business Intelligence: Comparative Analysis Of Olap Tools, Mahesh Kumar Bhetwal Nov 2011

Data Warehouse And Business Intelligence: Comparative Analysis Of Olap Tools, Mahesh Kumar Bhetwal

Regis University Student Publications (comprehensive collection)

Data Warehouse applications are designed basically to provide the business communities with accurate and consolidated information. The objective of Data Warehousing applications are not just for collecting data and reporting, but rather for analyzing, it requires technical and business expertise tools. To achieve business intelligence it requires proper tools to be selected. The most commonly used Business intelligence (BI) technologies are Online Analytical Processing (OLAP) and Reporting tools for analyzing the data and to make tactical decision for the better performance of the organization, and more over to provide quick and fast access to end user request. This study will …


Exploring Information Technologies To Support Shotgun Proteomics, Alexander M. Mendoza Nov 2011

Exploring Information Technologies To Support Shotgun Proteomics, Alexander M. Mendoza

Regis University Student Publications (comprehensive collection)

Shotgun proteomics refers to the direct analysis of complex protein mixtures to create a profile of the proteins present in the cell. These profiles can be used to study the underlying biological basis for cancer development. Closely studying the profiles as the cancer proliferates reveals the molecular interactions in the cell. They provide clues to researchers on potential drug targets to treat the disease. A little more than a decade old, shotgun proteomics is a relatively new form of discovery, one that is data intensive and requires complex data analysis. Early studies indicated a gap between the ability to analyze …


Continuous Monitoring In The Cloud Environment, Victoria Nyffeler Oct 2011

Continuous Monitoring In The Cloud Environment, Victoria Nyffeler

Regis University Student Publications (comprehensive collection)

The National Institute of Standards and Technology introduced a risk management framework that concludes with a process for continuous monitoring. Continuous monitoring is a way to gain near real-time insight into the security health of an information technology environment. The cloud environment is unique from other environments in the way that resources are virtualized and shared among many cloud tenants. This type of computing has been gaining popularity as a solution for organizations to purchase resources as an on-demand service in the same way that an organization purchases utilities today. In order to experience the benefits promised by the emergence …


An Inquiry Regarding The Development Of An Effectual Architecture Framework Supporting Next Generation 9-1-1, Patrick Purdy Oct 2011

An Inquiry Regarding The Development Of An Effectual Architecture Framework Supporting Next Generation 9-1-1, Patrick Purdy

Regis University Student Publications (comprehensive collection)

The emergency 9-1-1 service is a vital part of our nation"â„¢s emergency response and disaster preparedness systems. At last count there were 6100 Public Safety Answering Points across the United States, 97 of those reside in the State of Colorado, and the citizens of the United States cannot email, text, or instant message these types of non-traditional communication to those Public Safety Answering Points due to technological limitations. The trends in personal communication technologies are accelerating the obsolescence of the current 9-1-1 systems. The Public Safety Answering Point of today is designed to accept and process voice media only; and …


The Insider Threat, Jacinda L. Wunderlich Oct 2011

The Insider Threat, Jacinda L. Wunderlich

Regis University Student Publications (comprehensive collection)

The Insider threat is defined similarly by experts in the information technology world for businesses, but addressing the threat has not been of great focus for most organizations. Technology and the Internet have grown exponentially over the past decade leading to changes in how business is conducted. Some basic business practices remain the same; protect the organization and its customers from breach of privacy. How data is gathered, stored, and retrieved has changed. Protecting the perimeter is still important, but these changes in technology now open the doors to a new threat; one that is known but not commonly protected …


Drawbacks With It Outsourcing; Dealing With The End Of The Contract, Michael Muntean Sep 2011

Drawbacks With It Outsourcing; Dealing With The End Of The Contract, Michael Muntean

Regis University Student Publications (comprehensive collection)

Many companies have looked to outsourcing Information Technology infrastructure and business processes as a means to save capital and streamline company business and assets. While companies initially approach outsourcing engagements concentrating on the migration of data and services to the vendor company, they rarely take into account potential issues that could possibly cause an outsourcing engagement to fail. Failure to address these potential issues within the contract can lead a business to be stuck in an outsourcing engagement that offers little to no benefit to the company. This project presents the details of a survey performed at a business that …


Investigation Of Efficient Unified Threat Management In Enterprise Security, Ryan Lynn Sep 2011

Investigation Of Efficient Unified Threat Management In Enterprise Security, Ryan Lynn

Regis University Student Publications (comprehensive collection)

This thesis explores the problems that exist today with perimeter security in data communications specifically the disparate architecture that exists to mitigate risk. Currently there are many different components to the enterprise security perimeter that are not cohesive and do not collaborate well to form an efficient, scalable, operationally supportable gateway design. The thesis breaks down this problem by illustrating the shortcomings of current technologies. These illustrations are used in conjunction with published research and authored research to provide solid footing for the idea of a unified threat management or UTM model. In this model, threat prevention techniques are consolidated …


Analysis Of Windows Cardspace Identity Management System, Thomas Hanrahan Aug 2011

Analysis Of Windows Cardspace Identity Management System, Thomas Hanrahan

Regis University Student Publications (comprehensive collection)

The Internet, which was originally developed for academic purposes, has expanded and been applied to commercial and business enterprises. It is possible to purchase airline tickets, check bank balances and communicate through e-mail with each other through the Internet. These services can all be performed relatively easily with the proliferation of Internet Service Providers and the lower cost of Personal Computers. The development of the Internet has also had a huge impact on businesses with the growth of e-commerce, e-banking and the tremendous growth in email traffic. There is however a negative impact to this development of the Internet with …


Automated Database Refresh In Very Large And Highly Replicated Environments, Eric King Aug 2011

Automated Database Refresh In Very Large And Highly Replicated Environments, Eric King

Regis University Student Publications (comprehensive collection)

Refreshing non-production database environments is a fundamental activity. A non-productive environment must closely and approximately be related to the productive system and be populated with accurate, consistent data so that the changes before moving into the production system can be tested more effectively. Also if the development system has more related scenario as that of a live system then programming in-capabilities can be minimized. These scenarios add more pressure to get the system refreshed from the production system frequently. Also many organizations need a proven and performant solution to creating or moving data into their nonproduction environments that will neither …


Examining Military Retention Rates Of It Service Members: Research Towards Mitigating The Loss Of It Professional Service Members, Paul B. Warner Aug 2011

Examining Military Retention Rates Of It Service Members: Research Towards Mitigating The Loss Of It Professional Service Members, Paul B. Warner

Regis University Student Publications (comprehensive collection)

The turnover rate for information technology professionals in the military is high due to a demand for skilled information technology (IT) professionals in the private sector that value the IT training professionals receive in the military, and which can offer the compensation to lure military personnel to the civilian market. The Department of Defense consistently invests a great deal of time and money into Information Technology trained service members, only to lose them to attractive job positions with civilian companies which are in demand for their specialized skills. With a MOS (mission of service) field that requires a larger monetary …


Erp Implementation: An Investigation Into Social Capital And Knowledge Extraction In The Public Sector., Corey E. Jensen Aug 2011

Erp Implementation: An Investigation Into Social Capital And Knowledge Extraction In The Public Sector., Corey E. Jensen

Regis University Student Publications (comprehensive collection)

The elements of a successful Enterprise Resource Planning implementation strategy have been widely researched in the information technology field. Many have sought to compile a complete list of attributes that, if utilized, would guarantee a successful ERP implementation while also adhering to relative time and budget constraints. While several critical success factors have been identified and further enabled higher success rates in evolving ERP implementation strategy, there appears to be room for additional improvement. Extracting essential corporate knowledge from existing information systems in effort to implement an ERP solution is often one of the most challenging tasks of the implementation …


Computer Security Policy: Preventing Vulnerabilities And The Impact Of Selective Enforcement On An Organization, Latrice D. Parker-Stewart Jul 2011

Computer Security Policy: Preventing Vulnerabilities And The Impact Of Selective Enforcement On An Organization, Latrice D. Parker-Stewart

Regis University Student Publications (comprehensive collection)

This project focuses on the importance of a computer security policy as a whole. It also looks at how security policies assist in preventing vulnerabilities that may be instigated by employees. Moreover, the project views how the concept of selective enforcement can affect and impact an organization. This project delves into actual cases of employee misconduct in various organizations. It explains how policies were violated and the repercussions of these various misdeeds. Finally the project discusses different items that a good security policy should have and how important it is for policies to be enforced. It is vital that an …


A Fuzzy Logic Stock Trading System Based On Technical Analysis, Sammy Zeigenbein Jun 2011

A Fuzzy Logic Stock Trading System Based On Technical Analysis, Sammy Zeigenbein

Regis University Student Publications (comprehensive collection)

Technical analysis of financial markets involves analyzing past price movements in order to identify favorable trading opportunities. The objective of this research was to demonstrate that a fuzzy logic stock trading system based on technical analysis can assist average traders in becoming successful by optimizing the use of technical indicators and trading rules that experts use to identify when to buy and sell stock. Research of relevant literature explored the current state of knowledge in methodologies for developing and validating trading systems using technical indicators and fuzzy logic trading systems, providing guidelines for the development and evaluation of the system. …


Towards A Traceable Enterprise Architecture For Small- And Medium-Sized Enterprises, Brian R. Houghtaling Jun 2011

Towards A Traceable Enterprise Architecture For Small- And Medium-Sized Enterprises, Brian R. Houghtaling

Regis University Student Publications (comprehensive collection)

The practice of Enterprise Architecture (EA) continues to develop. Many large organizations are using EA processes and practices to help manage their complex set of integrated processes and applications. The set of integrated processes and applications required to meet their unique business requirements. Large organizations inherently recognize that an effective EA assists the enterprise to determine its desired direction. The resulting EA is then used to help manage the changes required to achieve the enterprises chosen destination. In a similar manner, Small- and Medium-Sized Enterprises (SMEs) can benefit from EA practices. Achieving these benefits requires EA practices and tools be …


Uncovering Network Perimeter Vulnerabilities In Cisco Routers According To Requirements Defined In Pci Dss 2.0, David E. Naples Jun 2011

Uncovering Network Perimeter Vulnerabilities In Cisco Routers According To Requirements Defined In Pci Dss 2.0, David E. Naples

Regis University Student Publications (comprehensive collection)

According to the Payment Card Industry (PCI), over 500 million records containing sensitive cardholder data have been breached since January 2005. Merchants accepting credit and debit cards are at the center of payment card transactions, making it crucial that standard security procedures and technologies are employed to thwart cardholder data theft. Numerous organizations have experienced embarrassing breaches, which lead to losses of credit card data, including Starbucks, California Pizza Kitchen, and TJX Companies. This paper examined an action research methodology to test the security of a network router and remediate all the vulnerabilities that caused it to fail the requirements …


A Project To Design, Implement, And Populate An Effective Geodatabase In Order To Re-Organize Geographic Information Systems Instructional A Small Community College, James C. Gibbons May 2011

A Project To Design, Implement, And Populate An Effective Geodatabase In Order To Re-Organize Geographic Information Systems Instructional A Small Community College, James C. Gibbons

Regis University Student Publications (comprehensive collection)

Geographic information systems instruction at a small community college was deemed inadequate by instructional staff and students. Inadequate resources and inefficient organization of data resulted in frustration for all users. Slow infrastructure resulted in excessive time needed to complete student projects and precluded the course objectives to be fully met. A project was completed to define requirements and recommendations, obtain necessary upgrades to both hardware and network infrastucture, reorganize data storage in a local geodatabase, and institute methods for more efficient instruction using ArcView and ArcCatalog applications from the software suite ArcGIS Desktop by ESRI. Subsequent adoption of the changes …


Use Of Service Oriented Architecture For Scada Networks, Scott H. Beavers May 2011

Use Of Service Oriented Architecture For Scada Networks, Scott H. Beavers

Regis University Student Publications (comprehensive collection)

Supervisory Control and Data Acquisition (SCADA) systems involve the use of distributed processing to operate geographically dispersed endpoint hardware components. They manage the control networks used to monitor and direct large-scale operations such as utilities and transit systems that are essential to national infrastructure. SCADA industrial control networks (ICNs) have long operated in obscurity and been kept isolated largely through strong physical security. Today, Internet technologies are increasingly being utilized to access control networks, giving rise to a growing concern that they are becoming more vulnerable to attack. Like SCADA, distributed processing is also central to cloud computing or, more …


The Best Nix For A Combined Honeypot Sensor Server, Stephen M. Rodriguez Apr 2011

The Best Nix For A Combined Honeypot Sensor Server, Stephen M. Rodriguez

Regis University Student Publications (comprehensive collection)

The paper will examine (through case-study) the usability of open source operating systems software for a combined Honeypot sensor server. The study will scrutinize the use of two Unix variants, Linux Red Hat and the Sun Solaris operating systems as candidates for deployment of a combined Honeypot sensor server. Appropriate unbiased metrics, such as extensibility, reliability, ease of install and use, will be employed as a likely criterion to evaluate the operating systems for the role of hosting Honeypot sensor server software.


A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker Apr 2011

A Qualitative Study To Explore The Low Number Of Women In Information Technology In The United States, William Baker

Regis University Student Publications (comprehensive collection)

The number of women in Information Technology in the United States has historically been lower than the number of men in the field. This study explores the reasons behind this disparity and recommends steps that can be taken to increase the number of women in the field. This qualitative study examines why women are not attracted to the Information Technology field and examines reasons why women leave the field. Surveys were conducted with two populations, (1) women who currently work in Information Technology and (2) Information Technology recruiters. The results of these surveys were analyzed to see if there were …


Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett Apr 2011

Towards A Framework For Maintaining Defensibility In Encrypted Network Environments, John Prewett

Regis University Student Publications (comprehensive collection)

Network security professionals improve confidentiality and integrity of information technology resources when they incorporate encryption schemes into the transmission of network packets across their respective infrastructures. Ironically, network engineers and administrators that incorporate encryption strategies across their infrastructures must simultaneously confront the limitations of end-to-end encrypted network packets inasmuch as they severely impair visible, defensible network architectures. This project demonstrates how security professionals charged with maintaining network visibility can deploy encryption across their topologies without fear of compromising their ability to capture – then fully analyze – network traffic. In so doing, information technology industry practitioners and researchers may confidently …


A Methodology For Capturing Tacit Knowledge Within The Defense Industry, Stephen M. Dokus Apr 2011

A Methodology For Capturing Tacit Knowledge Within The Defense Industry, Stephen M. Dokus

Regis University Student Publications (comprehensive collection)

This study looks at the knowledge management practices used by study participants from the defense industry and offers a methodology for capturing tacit knowledge. Interviews were conducted with stakeholders involved in work teams focused on the development and acquisition of defense systems. Those interviewed held various staff and management positions in Program Management (PM), Enterprise Architecture (EA), and system safety auditing. This researcher conducted primary research in the form of a Case Study. Interviewees in the defense industry supporting the Army, Marine Corps and Military aeronautics were interviewed and asked to provide feedback on their experiences and knowledge of tacit …


Evaluating Best Practices In Document Management, Angela Lokie Apr 2011

Evaluating Best Practices In Document Management, Angela Lokie

Regis University Student Publications (comprehensive collection)

The purpose of this research is to create a knowledgebase of best practices for records managers to select the vendor that best fits the individual needs of the organization. Investigative interviews were conducted with individuals from Association for Information and Image Management (AIIM) and the Project Management Institute (PMI). These project managers were asked questions in regards to the best practices when implementing a document management system. Best practices are relevant when implementing a document management solution. In order to consider best practices when implementing a document management solution, the following research objectives will be taken into consideration: How do …


Service Delivery Utilizing Wireless Technology Within The Air Traffic Control Communication And Navigation Domain To Improve Positioning Awareness, Samuel Durbin Apr 2011

Service Delivery Utilizing Wireless Technology Within The Air Traffic Control Communication And Navigation Domain To Improve Positioning Awareness, Samuel Durbin

Regis University Student Publications (comprehensive collection)

Current air traffic levels around the world have pushed the enterprise architecture deployed to support air traffic management to the breaking point. Technology limitations prevent expansion of the current solutions to handle rising utilization levels without adopting radically different information delivery approaches. Meanwhile, an architectural transition would present the opportunity to support business and safety requirements that are not currently addressable. The purpose of this research paper is to create a framework for more effectively sharing positioning information utilizing improved air traffic control navigation and communication systems.


Gender Equality With Agile In Software Engineering, Deborah P. Martin Apr 2011

Gender Equality With Agile In Software Engineering, Deborah P. Martin

Regis University Student Publications (comprehensive collection)

Women are under-represented in information technology careers in general and in the profession of software development in particular and their numbers are declining. Previous studies on this topic have investigated whether the reason for this is due to a difference in capability arising out of their gender, or whether the reason arises from social factors. A software development methodology called “Agile†has arisen in recent years which focus on collaboration, working software, and a sustainable workweek. Studies have shown that adopting Agile techniques in the classroom helps to retain women in computer information academic curricula and that adopting them in …


Understanding Data Within The Enterprise To Control Or Reduce Data Storage Growth, Anthony Daubenmerkl Apr 2011

Understanding Data Within The Enterprise To Control Or Reduce Data Storage Growth, Anthony Daubenmerkl

Regis University Student Publications (comprehensive collection)

Data is collected from a number of entities within the business environment; it is the essential component that guides the decision making process. Data management is a topic that continues to be discussed as our ability to collect and store data expands. The purpose of this study was to determine whether the data, in the context of the enterprise and its management, was understood allowing best practice data collection and storage policies to be defined. Data collection and storage are tightly coupled in the discussion of storage growth. The literature review showed that a number of data management lifecycles and …


Mandated Government Regulations In Healthcare: Is Healthcare It Overregulated? A Post Mandate Study, Mark Albright Mar 2011

Mandated Government Regulations In Healthcare: Is Healthcare It Overregulated? A Post Mandate Study, Mark Albright

Regis University Student Publications (comprehensive collection)

Over the past decade, healthcare organizations have been subjected to many federally mandated statutes to comply with. Three of the biggest statutes over the last decade are the Health Information Portability and Accountability Act (HIPAA), the Red Flag Rules, and the Health Information Technology for Clinical Health (HITECH). These mandates deal directly with the security of electronic patient information. To date, many entities have provided estimations of cost of compliance. Some have provided quantitative models to calculate the return of IT investments. Very few have attempted to look retrospectively and determine the level of and barriers to compliance. This quantitative …


When Is An Enterprise Service Bus (Esb) The Right Choice For An Integrated Technology Solution?, John (Gerry) Burns Feb 2011

When Is An Enterprise Service Bus (Esb) The Right Choice For An Integrated Technology Solution?, John (Gerry) Burns

Regis University Student Publications (comprehensive collection)

The Enterprise Service Bus (ESB) is an important systems integration technology often closely associated with Service Oriented Architecture (SOA). Some maintain that an ESB should not be used apart from SOA. Others see the ESB simply as the next generation of middleware, incorporating the best of its predecessors, Enterprise Application Integration (EAI) and Message Oriented Middleware (MOM), and a candidate for any integration requirement. Is the ESB a one-size-fits-all solution to be trusted for any integration requirement, or must its use be carefully considered with proper due diligence based on application complexity and/or the presence or absence of a defined …


Information Assurance; Small Business And The Basics, William Samuel Fleming Iv Jan 2011

Information Assurance; Small Business And The Basics, William Samuel Fleming Iv

Regis University Student Publications (comprehensive collection)

Business is increasingly dependent on information systems to allow decision makers to gather process and disseminate information. As the information landscape becomes more interconnected, the threats to computing resources also increase. While the Internet has allowed information to flow, it has also exposed businesses to vulnerabilities. Whereas large businesses have information technology (IT) departments to support their security, small businesses are at risk because they lack personnel dedicated to addressing, controlling and evaluating their information security efforts. Further complicating this situation, most small businesses IT capabilities have evolved in an ad hoc fashion where few employees understand the scope of …