Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Physical Sciences and Mathematics
Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz
Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz
Faculty Publications
Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that …
Understanding The Influence Of Perceptual Noise On Visual Flanker Effects Through Bayesian Model Fitting, Jordan Deakin, Dietmar Heinke
Understanding The Influence Of Perceptual Noise On Visual Flanker Effects Through Bayesian Model Fitting, Jordan Deakin, Dietmar Heinke
MODVIS Workshop
No abstract provided.
Streamlining Project Development Through Planning & Environmental Linkages, Karen Hadley, Brett Lackey
Streamlining Project Development Through Planning & Environmental Linkages, Karen Hadley, Brett Lackey
Purdue Road School
As transportation agencies continue to explore ways to be more efficient in the project development process, they are embracing integrated methodologies like planning and environmental linkages. This tool is practical, yet highly effective and inclusive, and teams across the country are experiencing its value. This presentation will highlight a variety of use cases, discuss lessons learned and best practices, and specifically address how planning and environmental linkages can be applied in Indiana and the Midwest.
Password Managers: Secure Passwords The Easy Way, Alexander Master
Password Managers: Secure Passwords The Easy Way, Alexander Master
CERIAS Technical Reports
Poor passwords are often the central problem identified when data breaches, ransomware attacks, and identity fraud cases occur. This Purdue Extension publication provides everyday users of Internet websites and computer systems with tools and strategies to protect their online accounts. Securing information access with password managers can be convenient and often free of cost, on a variety of devices and platforms. “Do’s and Don’ts” of password practices are highlighted, as well as the benefits of multi-factor authentication. The content is especially applicable for small businesses or non-profits, where employees often share access to systems or accounts.