Frank H. Katz

Frank H. Katz
Armstrong State University | Armstrong · Department of Computer Science and Information Technology

About

10
Publications
2,704
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
64
Citations
Citations since 2017
0 Research Items
22 Citations
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468
201720182019202020212022202302468

Publications

Publications (10)
Conference Paper
Cryptography is the foundation on which information and cyber security is built. As Mark Stamp has written, "cryptography or 'secret codes' are a fundamental information security tool." [6] Without the ability to encrypt and decrypt messages or data, the fundamental characteristic of confidentiality, which is the prevention of "unauthorized reading...
Conference Paper
In computer science curricula, we teach our students to program on their own, while in the "real world," programming is accomplished via cobbling together modules and subroutines stored in repositories that were written by others. Similarly, teaching Cyber Security or any other curricula does not occur in a vacuum. Instructors may want to be imagin...
Article
In October 2010, the paper "Curriculum and Pedagogical Effects of the Creation of a Minor in Cyber Security" was presented at InfoSecCD 2010. It described the issues related to the creation of a minor in Cyber Security at Armstrong Atlantic State University (AASU, and its effects on the curriculum of AASU's Information Technology major. The conclus...
Article
Full-text available
In January 2006, Armstrong Atlantic State University (AASU) offered its first course in Information Security. At the same time, the university received funding for its Cyber Security Research Institute, a non-academic unit closely related to and funded by the U.S. Department of Homeland Security. The establishment of this research institute led the...
Article
Full-text available
As Armstrong Atlantic State University (AASU) enters the wireless world during the Spring 2007 semester, it is important that those connecting to the university's network use notebook computers that are free from viruses and malware. In order to help secure this network, Information Technology students were given practical experience by organizing...
Conference Paper
Full-text available
As Armstrong Atlantic State University prepares to enter the wireless world during the 2006-07 academic year, it is important that those connecting to the university's network use notebook computers that are free from viruses and malware. In order to help secure the network, Information Technology students were given practical experience by organiz...
Article
Full-text available
This paper reports on the need for Information Security Awareness educational programs to supplement teaching in Information Security. The need for such a program is demonstrated by findings resulting from a survey of university faculty and staff at Armstrong Atlantic State University conducted from February through April 2005 regarding the informa...
Article
Full-text available
From its humble beginnings as a directory of incoming students named thefacebook.com at Harvard in February 2004, to a mega-site used by the campaign of Barack Obama to harness the power of the youth vote, Facebook has become an international phenomenon. Along with myspace.com, Linkedin.com, and others, social networking web sites have changed the...
Article
Full-text available
The infrastructure of computer networks in the United States is not only vital to our nation's economy, but is also a crucial element of our national security. Professionals in the Information Technology community are routinely concerned with the day-to- day threats of viruses and hacks into these networks. However, it is essential that this commun...
Article
Full-text available
Significant weaknesses in the Wired Equivalency Protocol (WEP) led to the creation of the Wi-Fi Protected Access (WPA) Wired Local Area Network (WLAN) security protocol and the amendment to that protocol, WPA2. Certified by the WiFi Alliance in 2001, WPA[1] was superseded by WPA2 in 2006[1] as being mandatory for usage with the IEEE 802.11i standar...

Projects

Project (1)
Project
Paper for CyCon US 2017 - Cyber Conference sponsored by Army Cyber Institute at West Point