Erik Moore

Erik Moore
  • Ph.D. Cybersecurity 2020
  • Program Director of Online MS in Cybersecurity Leadership at Seattle University

About

22
Publications
1,027
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
42
Citations
Introduction
I prefer research that contributes to the sustainability, resilience, and advancement of human society. My research interests include cybersecurity, education, society, 3D builds for cyber security, and behavioral sciences. I'm working on projects to increase capacity and resilience in cyber defense. Scopus: 55426010100 Orcid: 0000-0003-1566-526X Web of Science: AAB-8376-2020 Semantic Scholar: 143675493 https://dblp.org/pid/82/1383.html https://openreview.net/profile?id=~Erik_Lowell_Moore1
Current institution
Seattle University
Current position
  • Program Director of Online MS in Cybersecurity Leadership
Additional affiliations
September 2004 - March 2021
Center for a Reasoning Society
Position
  • CEO
Description
  • Leading a 501(c)3 non-profit charitable organization to promote better personal and societal thinking through school science and critical thinking programs, library programs, presentations, and a global relief fund. https://www.centerforareasoningsociety.org/
May 2010 - September 2012
DeVry University
Position
  • Head of Faculty
Description
  • Supervise faculty the colleges of Engineering and Computer Science, and Media Arts including programs like Electronics Engineering , Computer & Information Technology, and Media Design. Initiated the DR DeVry program for hands on undergraduate research and design projects. Contributed to DeVry International strategy, traveling to DeVry sites all over the western hemisphere.
Education
May 2019 - October 2020
University of Plymouth
Field of study
  • Cybersecurity
January 1996 - June 1997
University of Denver
Field of study
  • Telecommunications
September 1986 - August 1988
University of Florida
Field of study
  • Art - Photography, Printmaking, Sculpture, Design

Publications

Publications (22)
Conference Paper
Full-text available
The SolarWinds attack of 2020 was one of the most impactful cyber- attacks on the US. Our interdisciplinary research team had the opportunity to observe and analyze the human aspects of the corresponding incident response as it unfolded. Four main themes were identified through a series of interviews and incident observations. This led to an unders...
Conference Paper
Multi-Shield Cybersecurity Visualization (MSCV) is a method designed to increase attention on and understanding of critical relationships when designing and analyzing cybersecurity infrastructure. It can be used in conjunction with the Zero Trust Reference Architecture (ZTRA) or any other security reference architectures. It provides a way of visua...
Chapter
Full-text available
As technology proliferates and becomes indispensable to all functions of society, so does the need to ensure its security and resilience through cyber defense training, education, and professional development. This paper presents a layered model that supports cyber defense training progressively through the development of technology services, digit...
Conference Paper
Full-text available
To enhance the capabilities of a cyber defense collaborative, a psychometric analysis team was embedded in a collaborative incident response team. Collaborative incident response community members included the State of Colorado, the Colorado National Guard, Regis University, private companies, and others. The collaborative training developed when N...
Thesis
Full-text available
(full text avaiable at https://pearl.plymouth.ac.uk/handle/10026.1/16608 cc: Attribution-NonCommercial-NoDerivs 3.0) As society advances in terms of information technology, the dependency on cyber secure systems increases. Likewise, the need to enhance both the quality and relevance of education, training, and professional development for cybersecu...
Conference Paper
This work presents a model for reviewing the risks of institutions teaching cybersecurity. The work is based on efforts in this direction at Regis University and Adams 12 Five Star Schools in Colorado. These two institutions are described in a comparative case study reviewing the following four aspects of addressing risk: policy, adjudication, infr...
Conference Paper
Following earlier research in demonstrating the significance of behavioral analysis in cyber defense, the authors developed a framework to incorporating multi-disciplinary datasets along a common timeline to increase incident response feedback for coaching. Currently this framework is being introduced in the state of Colorado, USA as apart of a joi...
Conference Paper
Full-text available
Abstract: In the United States, the State of Colorado’s Department of Transportation successfully defended and recovered from a recent severe malware attack. The 2018 attack at the Colorado Department of Transportation was mitigated by a rapid multi-agency incident response. This is the first case in the United States where a state’s National Guard...
Conference Paper
This study presents the context and measured results of cyber security joint cyber defense training exercises. Building on previously published work by the authors that introduced AGILE methodologies, this study analyzes the outcomes of that professional development and laboratory-supported environment. Analysis focuses on the development of specif...
Conference Paper
Full-text available
The loss of cyber identities, accounts, persona, and transactional ability is leading to increased urgency and the need to escalate cyber response as institutions and individuals respond to malicious and inadvertent disruption in cyber presence. Presented here is a model for addressing this challenge that may help to de-escalate disruptions in cybe...
Conference Paper
This study provides a summary and analysis of a cyber security multi agency collaboration for rapid response by Regis University (RU), in partnership with the Colorado Army and Air Force National Guard (CONG) and the State of Colorado (SOC), deploying AGILE methods to improve the ability of the CONG and SOC to respond to attacks against Colorado’s...
Conference Paper
Full-text available
The increasing proliferation and psychological and physical embeddedness of the global digital infrastructure call us to reconsider traditional models of vulnerability, attack trees, and security auditing. The easy coordination of disparate digital means of attack suggests we should move to tighter coordination between digital information assurance...
Conference Paper
Full-text available
In March 2012, the Rocky Mountain Collegiate Cyber Defense Competition (RMCCDC) was hosted at Regis University and attended by seven colleges from the region. CCDC was developed by the University of Texas in San Antonio to provide a structured environment for practical education tied to established information assurance learning objectives in the i...
Conference Paper
Full-text available
Teaching physical security can be difficult since classes generally do not have access to physical structures to assess. The purpose of this study was to investigate a new way of teaching physical security using Second Life® and to see if there is a difference in performance related to mode of instruction. The research question sought to determine...
Conference Paper
A wide variety of virtualization methods have recently come into common use. Using these methods as a suite of tools to tune service offerings has becoming a viable strategy for enhancing an Academic Research Network (ARNe) as it services a globally dispersed user population. This report will present a model for organizing and applying these virtua...
Book
Visual Philosophy Language 1.0, From Metaphysics to Metadata presents a strikingly innovative metaframework for understanding problems in philosophy that is both intuitive for the novice and full of subtlety and potential for the seasoned scholar. The analysis presented in this book demonstrates original methods of achieving a new level of discours...
Conference Paper
Full-text available
This report presents research into the use of iSCSI SAN technology to create ad hoc provisioning for development environments, emergency provisioning, and training scenarios. Included in the topics analyzed are VMware environments, low bandwidth trials, and the use of TOE devices to support scalability. While the primary experience of the author is...
Book
Seeing Through, a response to the five veils of fundamentalism is designed for the reasonable non-religious person who is confronted with the classical arguments of fundamentalism and is looking for clear rational responses. It is also a valuable resource for the reformed or liberal religious person confronted by the fundamentalist forces in their...
Thesis
Full-text available
The primary purpose of this study is to bridge the gap between information technology (IT) managers and the college faculty by developing a series of forms (see appendix) to be completed by both groups. The IT manager has a broad array of telecommunications resources at his or her disposal, but does not have the expertise or authority to assign tho...
Chapter
While documenting significant details of the Mt. Fuji Pilgrimage gathered through multiple climbs and interviews, the author has both prepared a climbers guide to the traditions and an analysis of the roots of Japanese identity as revealed through interactions with climbers. Some key Kanji are provided with translation.
Thesis
A critical exploration of religious notions and iconography, working to create cognitive dissonance that address the empirical context and psychological aspects of icons and ideological assumptions. This essay supports a fine art portfolio and project requirement at the University of Florida. https://www.worldcat.org/title/structure-of-belief/oclc...

Network

Cited By