Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Social and Behavioral Sciences

Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James D. Ramsay Jan 2013

Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James D. Ramsay

Applied Aviation Sciences - Daytona Beach

Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …


The Case To Accredit Homeland Security Programs: Why Outcomes-Based Accreditation Makes Sense, James D. Ramsay Jan 2013

The Case To Accredit Homeland Security Programs: Why Outcomes-Based Accreditation Makes Sense, James D. Ramsay

Applied Aviation Sciences - Daytona Beach

The following essay lays out an argument for program level accreditation in academic homeland security (HS) programs. Admittedly, neither the practice nor the educational components of the HS discipline are standardized. Indeed, a recent analysis by the Congressional Research Service indicates that there remain several operational definitions of HS in practice. Regardless, this paper provides rationale which argues that after roughly eight years, academic HS has developed enough to be able to identify and support a distinct set of student learning outcomes— knowledge, skills and attitudes—that can both characterize and define the discipline.

Generally, program level academic accreditation requires a …


Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay Jan 2013

Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay

Applied Aviation Sciences - Daytona Beach

Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …


Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay Aug 2012

Perceptual Framing Of Homeland Security, Linda Kiltz, James D. Ramsay

Applied Aviation Sciences - Daytona Beach

This article analyzes the phenomenon of homeland security through the development of four conceptual lenses that were created out of the existing literatures in criminal justice, public administration, organization behavior, risk management, international relations, and the overlap between them. Using terrorism as a proxy for the homeland security enterprise, these conceptual lenses include: (1) homeland security as a criminal justice problem which views terrorism as a crime; (2) homeland security as a international relations problem which views terrorism as a war; (3) homeland security as an organization design problem which views terrorism as a network of sub-state transnational actors; and …


Introduction To Cryptography, Gary C. Kessler Apr 2012

Introduction To Cryptography, Gary C. Kessler

Applied Aviation Sciences - Daytona Beach

No abstract provided.


The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler Mar 2012

The Advanced Persistent Threat And The Role Of Cybersecurity Education, Gary C. Kessler

Applied Aviation Sciences - Daytona Beach

No abstract provided.


Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel Cutrer, Robert Raffel May 2010

Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel Cutrer, Robert Raffel

Applied Aviation Sciences - Daytona Beach

As a professional discipline, homeland security is complex, dynamic, and interdisciplinary and not given to facile definition. As an academic discipline, homeland security is relatively new and growing, and its workforce aging. As such, there is an acknowledged need to develop academic homeland security programs to try and meet anticipated workforce needs. However, the lack of an accreditation system or a set of available published outcomes (or standards) have complicated efforts towards homeland security program development. At present, determining which courses to teach and which outcomes in each course to pursue must be left to anecdotal conversations, reviews of the …


On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler Mar 2008

On Teaching Tcp/Ip Protocol Analysis To Computer Forensics Examiners, Gary C. Kessler

Applied Aviation Sciences - Daytona Beach

Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information security incidents. To truly understand the contents of the logs and the data packets, examiners need to have a good foundation in the protocols comprising the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. This paper introduces the use of protocol analyzers and packet sniffers for TCP/IP traffic, and provides examples of normal and suspect TCP/IP traffic. This paper also provides a basis for a discussion of intrusion detection and signature analysis.