Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
Ethical Hacking For Effective Defense (Modules, Labs, And Lectures), Hossain Shahriar
Ethical Hacking For Effective Defense (Modules, Labs, And Lectures), Hossain Shahriar
Computer Science and Information Technology Ancillary Materials
Summer 2019 Update: Through a Round Twelve ALG Mini-Grant for Ancillary Materials Creation and Revision, five new modules have been added to this collection:
- Enumeration with Sparta
- Enumeration with Inguma
- Hacking Web Servers with Dirbuster
- Hacking Web Servers with Skipfish
- Hacking Wireless and IoT with Bluehydra
The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:
https://oer.galileo.usg.edu/compsci-collections/8/
Topics include:
- TCP/IP Level Attacks
- Port Scanning
- DDoS
- Footprinting and Social Engineering
- Enumeration
- Programming for Security Professionals
- Operating System Vulnerabilities
- Embedded System Security
- Hacking Web Servers
- Hacking Wireless Networks
- Cryptography
- Protecting Networks with …
Cs04all: Cryptography Module, Hunter R. Johnson
Cs04all: Cryptography Module, Hunter R. Johnson
Open Educational Resources
Cryptography module
This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.
The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this …
Can Ego Defense Mechanism Help Explain Is Security Dysfunctional Behavior, Abhijit Chaudhury, Debasish Mallick
Can Ego Defense Mechanism Help Explain Is Security Dysfunctional Behavior, Abhijit Chaudhury, Debasish Mallick
Information Systems and Analytics Department Faculty Conference Proceedings
IS security behavior studies are becoming popular. To date, much of the research has been based on theories such as the Theory of Planned Behavior, Technology Adoption Model, Rational Choice theory and Theory of Reasoned Action. They view users as rational individuals making conscious utilitarian decisions when there is increasing evidence that security breaches are the result of human behavior such as carelessness, malicious intent, bad habits, and hostility. We propose the ego defense mechanism model, taken from the psychoanalytical world. This model makes no assumption of rationality and has been developed to help understand the roots of dysfunctional behavior …
What Are You Looking For: Identification Of Remnant Communication Artefacts In Physical Memory, Matthew Simon, Jill Slay
What Are You Looking For: Identification Of Remnant Communication Artefacts In Physical Memory, Matthew Simon, Jill Slay
International Cyber Resilience conference
Law enforcement has sound methods for investigating and obtaining data about targets that are using traditional communication services such as the Public Switched Telephone Network. The Internet as a data transfer medium is a vastly different paradigm to that of traditional telephony networks. Information about targets using Internet communication technologies cannot be obtained using the same methods used for traditional communication. There has been an identified need for methods to obtain information on targets that have been using Internet communication methods. The acquisition and analysis of physical memory has been proposed as a vector for the recovery of such information. …