Academic Papers

Business Continuity Analysis

The purpose of business continuity planning is to ensure continued operations of an organization in the event of a...

Nov 28 · 12 min read >
Business Continuity

An analysis of different data sources used in a forensics investigation

This article provides an overview of four different data sources used in various forensics investigations. The first source includes...

Nov 25 · 13 min read >
Data Sources

DNS Rebinding and Intrusion Detection with Contextual Signatures

This article summarizes and analyzes discussion from two different articles on the subjects of DNS Rebinding and the use of...

Feb 2 · 8 min read >
dns rebinding

Mitigating DoS or Distributed DoS (DDoS) attacks

Denial of Service (Dos) and Distributed Denial of Service (DDoS) attacks have continued to prove to be one of...

Jan 16 · 9 min read >
denial of service

Operating Systems Security: Protection Measures Analysis

The Internet has brought us a wealth of conveniences and everyday tools that we could not live without and...

Oct 25 · 12 min read >
Operating Systems Security

Curriculum Mapping for Expeditionary Learning

Curriculum Mapping is the process of documenting lessons, activities and assessment methods used within different grade levels and classes...

Jan 30 · 14 min read >
Curriculum Mapping for Expeditionary Learning

Backwards Design

Backwards design is a methodology used to develop curriculum, which promotes the identification of learning results at the start...

Jan 14 · 15 min read >

Hacktivism, Anonymous, and the Bureau of Justice Statistics

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government...

Mar 31 · 9 min read >