Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Physical Sciences and Mathematics

Ethical Hacking For Effective Defense (Modules, Labs, And Lectures), Hossain Shahriar Jul 2019

Ethical Hacking For Effective Defense (Modules, Labs, And Lectures), Hossain Shahriar

Computer Science and Information Technology Ancillary Materials

Summer 2019 Update: Through a Round Twelve ALG Mini-Grant for Ancillary Materials Creation and Revision, five new modules have been added to this collection:

  • Enumeration with Sparta
  • Enumeration with Inguma
  • Hacking Web Servers with Dirbuster
  • Hacking Web Servers with Skipfish
  • Hacking Wireless and IoT with Bluehydra

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

  • TCP/IP Level Attacks
  • Port Scanning
  • DDoS
  • Footprinting and Social Engineering
  • Enumeration
  • Programming for Security Professionals
  • Operating System Vulnerabilities
  • Embedded System Security
  • Hacking Web Servers
  • Hacking Wireless Networks
  • Cryptography
  • Protecting Networks with …


Cs04all: Cryptography Module, Hunter R. Johnson Feb 2019

Cs04all: Cryptography Module, Hunter R. Johnson

Open Educational Resources

Cryptography module

This archive contains a series of lessons on cryptography suitable for use in a CS0 course. The only requirement is familiarity with Python, particularly dictionaries, lists, and file IO. It is also assumed that students know how to create stand-alone Python programs and interact with them through the terminal. Most of the work is done in Jupyter notebooks.

The material found in the notebooks is a combination of reading material, exercises, activities and assignments. Below are descriptions of each lesson or assignment and links to notebooks on Cocalc. The same files are available for batch download in this …


Can Ego Defense Mechanism Help Explain Is Security Dysfunctional Behavior, Abhijit Chaudhury, Debasish Mallick Jan 2018

Can Ego Defense Mechanism Help Explain Is Security Dysfunctional Behavior, Abhijit Chaudhury, Debasish Mallick

Information Systems and Analytics Department Faculty Conference Proceedings

IS security behavior studies are becoming popular. To date, much of the research has been based on theories such as the Theory of Planned Behavior, Technology Adoption Model, Rational Choice theory and Theory of Reasoned Action. They view users as rational individuals making conscious utilitarian decisions when there is increasing evidence that security breaches are the result of human behavior such as carelessness, malicious intent, bad habits, and hostility. We propose the ego defense mechanism model, taken from the psychoanalytical world. This model makes no assumption of rationality and has been developed to help understand the roots of dysfunctional behavior …


What Are You Looking For: Identification Of Remnant Communication Artefacts In Physical Memory, Matthew Simon, Jill Slay Aug 2010

What Are You Looking For: Identification Of Remnant Communication Artefacts In Physical Memory, Matthew Simon, Jill Slay

International Cyber Resilience conference

Law enforcement has sound methods for investigating and obtaining data about targets that are using traditional communication services such as the Public Switched Telephone Network. The Internet as a data transfer medium is a vastly different paradigm to that of traditional telephony networks. Information about targets using Internet communication technologies cannot be obtained using the same methods used for traditional communication. There has been an identified need for methods to obtain information on targets that have been using Internet communication methods. The acquisition and analysis of physical memory has been proposed as a vector for the recovery of such information. …