Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cyber Security (3)
- Information systems (3)
- A (1)
- Architecture (1)
- Botnets (1)
-
- C& (1)
- Case study (1)
- Certification and accreditation (1)
- Cloud Computing and Service Oriented Architecture (1)
- Cloud computing (1)
- Common criteria (1)
- Computer science (1)
- Corporate governance (1)
- Cyber security (1)
- Department of Defense (1)
- DoD (1)
- Education technology (1)
- Information assurance (1)
- Information technology (1)
- Innovation (1)
- Linux (1)
- National Security Policy (1)
- Networking (1)
- Open Source Software and Virtualization (1)
- Open source software (1)
- Risk management (1)
- Secure Coding (1)
- Secure Programming (1)
- Secure Software Development Lifecycle (1)
- Security controls (1)
Articles 1 - 5 of 5
Full-Text Articles in Information Security
Technology Enhanced Learning With Open Source Software For Scientists And Engineers, Maurice Dawson, Imad Al Saeed, Jorja Wright, Mrwan Omar
Technology Enhanced Learning With Open Source Software For Scientists And Engineers, Maurice Dawson, Imad Al Saeed, Jorja Wright, Mrwan Omar
Maurice Dawson
This paper represents the evaluation and integration of Open Source Software (OSS) technologies to enhance the learning of engineers and scientists within the university. The utilization of OSS is essential as costs around the world continue to rise for education, institutions must become innovative in the ways they teach and grow Science, Technology, Engineering, & Mathematics (STEM) majors. To do this effectively professors and administrative staff should push toward the utilization of OSS and other available tools to enhance or supplement currently available tools with minimal integration costs. The OSS applications would allow students the ability to learn critical technological …
Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster
Dod Cyber Technology Policies To Secure Automated Information Systems, Maurice E. Dawson Jr., Miguel Crespo, Stephen Brewster
Maurice Dawson
Availability, integrity, and confidentiality (AIC) is a key theme everywhere as cyber security has become more than an emerging topic. The Department of Defense (DoD) has implemented multiple processes such as the Department of Defense information assurance certification and accreditation process (DIACAP), common criteria (CC), and created proven baselines to include information assurance (IA) controls to protect information system (IS) resources. The aim of this research study shall provide insight to the applicable processes, IA controls, and standards to include providing a method for selecting necessary government models and for system development.
Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar
Cyber Security And Mobile Threats: The Need For Antivirus Applications For Smart Phones, Jorja Wright, Maurice E. Dawson Jr., Marwan Omar
Maurice Dawson
Smartphones are becoming a vehicle to provide an efficient and convenient way toaccess, find and share information; however, the availability of this information hascaused an increase in cyber attacks. Currently, cyber threats range from Trojans andviruses to botnets and toolkits. Presently, 96% of smartphones do not have pre-installedsecurity software. This lack in security is an opportunity for malicious cyber attackers to hackinto the various devices that are popular (i.e. Android, iPhone and Blackberry). Traditionalsecurity software found in personal computers (PCs), such as firewalls, antivirus, andencryption, is not currently available in smartphones. Moreover, smartphones are even morevulnerable than personal computers because …
Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens
Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens
Maurice Dawson
Aligning information systems to corporate goals has emerged as a leading concern over the last couple of decades. It is essential that we understand the need for cloud computing and how this technology can be implemented. Through this literature review we review theories of cloud computing and further elaborate on the theoretical framework for the implementation of cloud computing technology across organizations. We also detail cloud computing implementations across various governmental organizations and also across the industry. This review is expected to provide the current study with a more practical perspective on the issues and complexities of using cloud computing …
Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster
Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster
Maurice Dawson
This article examines the integration of secure coding practices into the overall Software Development Life Cycle (SDLC). Also detailed is a proposed methodology for integrating software assurance into the Department of Defense Information Assurance Certification & Accreditation Process (DIACAP). This method for integrating software assurance helps in properly securing the application layer as that is where more than half of the vulnerabilities lie in a system.