Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

MS Powerpoint

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 25 of 25

Full-Text Articles in Information Security

Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe Apr 2023

Premium Wireless, Dakota Burkhart, Andrew Clark, Garrett Kenney, Brandon Monroe

ATU Research Symposium

Our work implements an inventory system and appointment system for the Premium Wireless phone company. It includes separate views for employees to manage inventory and view appointments for the day and the near future and allows customers to view all current inventory and set an appointment.


Generation Z Cybersecurity Learners: The Identification Of Cybersecurity Instructor Strategies And Attributes That Maximize Student Engagement, Jeffrey Rice Apr 2023

Generation Z Cybersecurity Learners: The Identification Of Cybersecurity Instructor Strategies And Attributes That Maximize Student Engagement, Jeffrey Rice

Scholar Week 2016 - present

There exists a significant shortage of cybersecurity specialists in the workforce. Universities should endeavor to keep cybersecurity students engaged if they desire to be competitive and contribute graduates to the remediation efforts of this cybersecurity deficit. Instructors significantly contribute to student engagement and there is a correlation between student engagement and student retention. The purpose of this regional qualitative exploratory study was to identify attributes that Generation Z collegiate cybersecurity learners felt kept them engaged in their cybersecurity courses. The sample comprised 10 individuals identified as GenZ and used purposeful and snowball sampling to select participants. A semi-structured interview strategy …


Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery Jul 2022

Code Cyber: A Curated Collection Of Cybersecurity Career Learning And Preparation Resources, Kazi Tasin, Ethan Pruzhansky, Jason Lin, Tanvir Rahman, Patrick J. Slattery

Publications and Research

Since we are living in a digital age, the need to protect ourselves and those who are vulnerable to cyber-attacks is paramount to prevent cyber attacks that steal information such as banking accounts and important sensitive information.

Our research team extensively investigated the five aspects of cybersecurity such as identity, protection, detection, and response. By conducting various interviews with cybersecurity professionals, we gathered information about these five aspects for example security intelligence or security operations and response, (thread hunting, response orchestration) identity access management, (identity management, and data protection), and risks (risk perspective). Our main goal is to look into …


Cybersecurity (Cs 3550): Lecture 1: Introduction & State Of Cybersecurity, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 1: Introduction & State Of Cybersecurity, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "1: Introduction & State of Cybersecurity" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 2: Cybersecurity Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 2: Cybersecurity Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "2: Cybersecurity Fundamentals" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 7-8: Risk Management, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 7-8: Risk Management, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "7-8: Risk Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 5: Intro To Web Applications I, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 5: Intro To Web Applications I, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "5: Intro to Web Applications I" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 3-4: Networking Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 3-4: Networking Fundamentals, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "3-4: Networking Fundamentals" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 9-10: Data Protection & Cryptography, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 9-10: Data Protection & Cryptography, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "9-10: Data Protection & Cryptography" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 14: Business Continuity & Disaster Recovery, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 14: Business Continuity & Disaster Recovery, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "14: Business Continuity & Disaster Recovery" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 21: Hacking Democracy: Election Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "21: Hacking Democracy: Election Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 13: Patching & Vulnerability Management, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 13: Patching & Vulnerability Management, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "13: Patching & Vulnerability Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 15: Application Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 15: Application Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "15: Application Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "11: Identity & Access Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "18-19: Anatomy of a Breach" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps Apr 2020

Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 3550: Cybersecurity - "12: Network & Endpoint Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability" (Week One) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Vulnerabilities and Exploits" (Week Two) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption and Hashing" (Week Four) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.


Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps Apr 2020

Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps

Open Educational Resources

Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers" (Week Three) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.


Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton Mar 2020

Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton

UNO Student Research and Creative Activity Fair

Cryptography is often a critical component in secure software systems. Cryptographic primitive misuses often cause several vulnerability issues. To secure data and communications in applications, developers often rely on cryptographic algorithms and APIs which provide confidentiality, integrity, and authentication based on solid mathematical foundations. While many advanced crypto algorithms are available to developers, the correct usage of these APIs is challenging. Turning mathematical equations in crypto algorithms into an application is a difficult task. A mistake in cryptographic implementations can subvert the security of the entire system. In this research, we present an automated approach for Finding and Repairing Bugs …


Amazon Alexa: The Best Personal Assistant Or An Eavesdropping Witch, Alisa Bohac, Michael Keck Mar 2018

Amazon Alexa: The Best Personal Assistant Or An Eavesdropping Witch, Alisa Bohac, Michael Keck

UNO Student Research and Creative Activity Fair

The prolific integration of Internet-of-Things (IoT) devices into our homes is continuously generating discussions surrounding the security and privacy of these devices. One device that has received particular attention in the past few years is the Amazon Alexa, a ‘personal assistant’ IoT device, which listens to user commands and performs certain actions. According to Amazon, “millions of Alexa devices” were sold in the 2017 Holiday period alone [1]. However, the continuous amalgamation of technology has prompted the idea that many digital devices, through their overall functionality, could be utilized by cybercriminals to digitally intrude into our personal lives [2]. Hence, …


Securing Mobile Applications Based On Ntru, Hanqing Zhao, Vikram Hegde, Kefeng Shi, Yi Yang Oct 2016

Securing Mobile Applications Based On Ntru, Hanqing Zhao, Vikram Hegde, Kefeng Shi, Yi Yang

ASA Multidisciplinary Research Symposium

Modern mobile devices have an urgent need for a new-generation public-key cryptographic system, which should provide sufficient security for mobile devices without degrading their performance due to limited resources. NTRU is an ideal model for this. We validate it through experimental studies. We apply NTRU to protect an Android mobile app.


Warcreate And Wail: Warc, Wayback, And Heritrix Made Easy, Mat Kelly, Michael L. Nelson, Michele C. Weigle Jan 2013

Warcreate And Wail: Warc, Wayback, And Heritrix Made Easy, Mat Kelly, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

[First slide]

The Problem

Institutional Tools, Personal Archivists

  • ON YOUR MACHINE

-Complex to Operate

-Require Infrastructure

  • DELEGATED TO INSTITUTIONS

-$$$

-Lose original perspective

  • Locale content tailoring (DC vs. San Francisco)
  • Observation Medium (PC web browser vs. Crawler)


Warcreate - Create Wayback-Consumable Warc Files From Any Webpage, Mat Kelly, Michele C. Weigle, Michael L. Nelson Jan 2012

Warcreate - Create Wayback-Consumable Warc Files From Any Webpage, Mat Kelly, Michele C. Weigle, Michael L. Nelson

Computer Science Faculty Publications

[First Slide]

What is WARCreate?

  • Google Chrome extension
  • Creates WARC files
  • Enables preservation by users from their browser
  • First steps in bringing Institutional Archiving facilities to the PC