Open Access. Powered by Scholars. Published by Universities.®

Information Security Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Information Security

Technology Enhanced Learning With Open Source Software For Scientists And Engineers, Maurice Dawson, Imad Al Saeed, Jorja Wright, Mrwan Omar Dec 2012

Technology Enhanced Learning With Open Source Software For Scientists And Engineers, Maurice Dawson, Imad Al Saeed, Jorja Wright, Mrwan Omar

Maurice Dawson

This paper represents the evaluation and integration of Open Source Software (OSS) technologies to enhance the learning of engineers and scientists within the university. The utilization of OSS is essential as costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow Science, Technology, Engineering, & Mathematics (STEM) majors. To do this effectively professors and administrative staff should push toward the utilization of OSS and other available tools to enhance or supplement currently available tools with minimal integration costs. The OSS applications would allow students the ability to learn critical technological …


Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster Dec 2012

Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster

Maurice Dawson

Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.


Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar Dec 2011

Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar

Maurice Dawson

Smartphones are becoming a vehicle to provide an efficient and convenient way toaccess, find and share information; however, the availability of this information hascaused an increase in cyber attacks. Currently, cyber threats range from Trojans andviruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installedsecurity software. This lack in security is an opportunity for malicious cyber attackers to hackinto the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditionalsecurity software found in personal computers (PCs), such as firewalls, antivirus, andencryption, is not currently available in smartphones. Moreover, smartphones are even morevulnerable than personal computers because …


Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens Dec 2010

Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens

Maurice Dawson

Aligning information systems to corporate goals has emerged as a leading concern over the last couple of decades. It is essential that we understand the need for cloud computing and how this technology can be implemented. Through this literature review we review theories of cloud computing and further elaborate on the theoretical framework for the implementation of cloud computing technology across organizations. We also detail cloud computing implementations across various governmental organizations and also across the industry. This review is expected to provide the current study with a more practical perspective on the issues and complexities of using cloud computing …


Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster Dec 2009

Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster

Maurice Dawson

This article examines the integration of secure coding practices into the overall Software Development Life Cycle (SDLC). Also detailed is a proposed methodology for integrating software assurance into the Department of Defense Information Assurance Certification & Accreditation Process (DIACAP). This method for integrating software assurance helps in properly securing the application layer as that is where more than half of the vulnerabilities lie in a system.