Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (8)
- Information Security (7)
- Social and Behavioral Sciences (7)
- Computer Engineering (4)
- Computer Law (4)
-
- Engineering (4)
- Law (4)
- Defense and Security Studies (3)
- Electrical and Computer Engineering (3)
- Forensic Science and Technology (3)
- Legal Studies (3)
- Political Science (3)
- Public Affairs, Public Policy and Public Administration (3)
- International Relations (2)
- Other Political Science (2)
- Education (1)
- Education Policy (1)
- Environmental Sciences (1)
- Environmental Studies (1)
- Geography (1)
- Higher Education (1)
- Nature and Society Relations (1)
- Other Computer Engineering (1)
- Other Computer Sciences (1)
- Other Psychology (1)
- Peace and Conflict Studies (1)
- Physics (1)
- Psychology (1)
- Social Psychology (1)
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Physical Sciences and Mathematics
From Degree To Chief Information Security Officer (Ciso): A Framework For Consideration, Wendi M. Kappers, Martha Nanette Harrell,
From Degree To Chief Information Security Officer (Ciso): A Framework For Consideration, Wendi M. Kappers, Martha Nanette Harrell,
Publications
Educational entities are establishing program degree content designed to ensure cybersecurity and information security assurance skills are adequate and efficient for preparing students to be successful in this very important field. Many Master’s level programs include courses that address these skills in an attempt to provide a well-rounded program of study. However, undergraduates who are in the practitioner’s world have other alternatives to gain these skills. These individuals can gain various certifications, such as the Certified Information Systems Security Professional (CISSP) or the Certified Information Security Manager (CISM). Due to a perceived gap between academics and field knowledge, it appears …
Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna
Simple Implementation Of An Elgamal Digital Signature And A Brute Force Attack On It, Valeriia Laryoshyna
Student Works
This study is an attempt to show a basic mathematical usage of the concepts behind digital signatures and to provide a simple approach and understanding to cracking basic digital signatures. The approach takes on simple C programming of the ElGamal digital signature to identify some limits that can be encountered and provide considerations for making more complex code. Additionally, there is a literature review of the ElGamal digital signature and the brute force attack.
The research component of this project provides a list of possible ways to crack the basic implementations and classifies the different approaches that could be taken …
Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado
Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado
Journal of Digital Forensics, Security and Law
Big data facilitates the processing and management of huge amounts of data. In health, the main information source is the electronic health record with others being the Internet and social media. Health-related data refers to storage in big data based on and shared via electronic means. Why are criminal organisations interested in this data? These organisations can blackmail people with information related to their health condition or sell the information to marketing companies, etc. This article analyses healthcare-related big data security and proposes different solutions. There are different techniques available to help preserve privacy such as data modification techniques, cryptographic …
Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling
Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling
Journal of Digital Forensics, Security and Law
Media and network systems capture and store data about electronic activity in new, sometimes unprecedented ways; computational systems make for new means of analysis and knowledge development. These new forms offer new, powerful tactical tools for investigations of electronic malfeasance under traditional legal regulation of state power, particular that of Fourth Amendment limitations on police searches and seizures under the U.S. Constitution. But autonomy, identity and authenticity concerns with electronic data raise issues of public policy, privacy and proper police oversight of civil society. We examine those issues and their implications for digital and computational forensics
Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala
Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala
Journal of Digital Forensics, Security and Law
That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …
Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan
Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan
Journal of Digital Forensics, Security and Law
Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …
The Psychology Of Intelligent Video Analysis, Ibpp Editor
The Psychology Of Intelligent Video Analysis, Ibpp Editor
International Bulletin of Political Psychology
This article examines issues surrounding software-enhanced video analysis in an intelligence context.
Science And Security Watch: A Threat To The United States From Foreign Graduate Students Training In Physics?, Ibpp Editor
Science And Security Watch: A Threat To The United States From Foreign Graduate Students Training In Physics?, Ibpp Editor
International Bulletin of Political Psychology
This article critiques concerns of some United States (US) security analysts that foreign graduate students in physics who train at universities within the US present security vulnerabilities for the US.
Likely And Unlikely Events In International Security Affairs: An Example From The People's Republic Of China, Ibpp Editor
Likely And Unlikely Events In International Security Affairs: An Example From The People's Republic Of China, Ibpp Editor
International Bulletin of Political Psychology
This article describes a human judgment shortfall in international security decision making based on statistical probabilities.
Trends. An Encryption Paradox: Cracking The Groupe Speciale Mobile Standard (Gsm), Ibpp Editor
Trends. An Encryption Paradox: Cracking The Groupe Speciale Mobile Standard (Gsm), Ibpp Editor
International Bulletin of Political Psychology
The author discusses the vulnerability of encryption methods used with today's modern technology.
Trends. Some Security Lessons From Kyoto, Ibpp Editor
Trends. Some Security Lessons From Kyoto, Ibpp Editor
International Bulletin of Political Psychology
The author discusses how "the environment" is no longer a fringe Issue championed by starry-eyed dreamers and psychodynamic deviants, and perennial misfits who have little understanding of or orientation to reality. In fact, the relevance of "the environment" for policies of political security has become quite significant.