Organizations continue to struggle with policies and processes to effectively secure their infrastructure to protect their information assets and intellectual property. In recent years, we have seen the increase of cyber-attacks and breaches to the point that they have become common news worldwide. As systems have grown in complexity with increased capacity to store large amounts of data, so to...
Business Continuity Analysis
This is post 12 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...
An analysis of different data sources used in a forensics investigation
This is post 11 of 12 in the series “Digital Forensics” Important Cybercrime Laws Yet More Theft of Information Assets Preparation Phase of a Digital Search Data Hiding and Steganography Confusion over Terminology Presenting Digital Evidence Remote Access Trojans Malicious Code Detection What is the Role of Computer Forensics? Forensics in Business Continuity Planning An analysis of...
DNS Rebinding and Intrusion Detection with Contextual Signatures
This is post 10 of 10 in the series “Intrusion Detection” TCP Congestion Control Installing Wireshark on Mac OS X (Yosemite) What are Rogue Access Points? Two Common Router Security Threats Modern Application Frameworks, Legacy Browsers and Security Implications What are Covert Channels? Mobile Considerations in Network Security Architecture Common Bluetooth Vulnerabilities to be...
Mitigating DoS or Distributed DoS (DDoS) attacks
This is post 9 of 10 in the series “Intrusion Detection” TCP Congestion Control Installing Wireshark on Mac OS X (Yosemite) What are Rogue Access Points? Two Common Router Security Threats Modern Application Frameworks, Legacy Browsers and Security Implications What are Covert Channels? Mobile Considerations in Network Security Architecture Common Bluetooth Vulnerabilities to be Aware...
Operating Systems Security: Protection Measures Analysis
The Internet has brought us a wealth of conveniences and everyday tools that we could not live without and more importantly a dependency that we cannot break. In the workplace the Internet has become a part of our day to day lives. We rely on instant communication with our co-workers, friends and colleagues as well as access to a multitude of information at our fingertips. Children from younger...
Curriculum Mapping for Expeditionary Learning
Curriculum Mapping is the process of documenting lessons, activities and assessment methods used within different grade levels and classes in an educational institution. Expeditionary Learning (EL) is a style of teaching that involves the students in experiences and problem-solving activities. This paper explores the intersection of these two educational theories and addresses how pedagogical...
Backwards Design
Backwards design is a methodology used to develop curriculum, which promotes the identification of learning results at the start of the design process. Wiggins and McTighe defined this term as part of their Understanding by Design (UbD) framework. Backwards design is not a new concept, it has been around for a long time and this paper explores some of the underlying research behind Wiggins and...
Hacktivism, Anonymous, and the Bureau of Justice Statistics
In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media.
Mobile Cybersecurity Policies in the Private and Public Sector
“We are moving into a new era of mobile computing, one that promises greater variety in applications highly improved usability, and speedier networking.” Godwin-Jones (2008). This statement rings true for the past five years where mobile computing has seen a massive explosion in growth.
Online Teaching and Learning Experiences in Higher Education
In 2007 I graduated from the University of Ulster’s new E-Learning masters program. For my thesis, I developed a research study on collaborative learning and more specifically the adoption of Adobe Connect at the University of Maryland University College.
Health Services and Challenges facing the Low-Literacy Population
In the United States, a large proportion of the population falls into the category of having low literacy skills. “A long-awaited federal study finds that an estimated 32 million adults in the USA — about one in seven — are saddled with such low literacy skills that it would be tough for them to read anything more challenging than a children’s picture book or to understand a...
Cybercrime: Law Enforcement and E-Government Transnational Issues
During his 2013 State of the Union address, President Obama highlighted the importance of defending our nation from the many cyber threats that are continuing to dominate the news cycles. Just days prior to the President’s speech, eighteen people were charged in a massive credit card fraud ring. The Associated Press (2013) described it as a “sprawling international scam that duped credit-rating...
Cybersecurity as a Public Good
Over the last decade, the boom of the Internet has had a major impact on the way we interact with other individuals and business entities. Products and services have become available at the touch of a button and access to vast amounts of information has become available to anyone with a direct connection to the web. Much correspondence, which was traditionally mailed through the...
Human Cognition Factors in Online Messaging
In a hypothetical study, the Interaction Design and Information Architecture (IDIA) department at the University of Baltimore decided to promote their Humans Computers and Cognition (IDIA 640) course to prospective students already enrolled in the program and to those interested in the field. In order to foster interest in the program, it was decided that a banner or ticker should be deployed...
“We Choose the Moon” From a Human Attention Perspective
Web based games and interactive applications have become a common means of teaching a wide range of concepts throughout K-12 schools in the United States. With the declining costs of hardware and software coupled with the increase of available bandwidth and transfer speeds, the development of educational applications has advanced significantly in the last five years.
Evaluation of a Major News Website From a Human Cognitive Perspective
Over the last decade, a shift has occurred in the way many people access, read and watch current events and news. From the traditional newspapers and scheduled television news programs, we have moved to a more dynamic interactive medium, which dispenses information in a real-time format. News websites are a fairly young media; however they have evolved exponentially since the late 1990s to the...
Security of Information Systems Infrastructure of an International Airport
This is post 7 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...
Malicious Code Intrusion
This is post 2 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...