About
10
Publications
2,704
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
64
Citations
Citations since 2017
Publications
Publications (10)
Cryptography is the foundation on which information and cyber security is built. As Mark Stamp has written, "cryptography or 'secret codes' are a fundamental information security tool." [6] Without the ability to encrypt and decrypt messages or data, the fundamental characteristic of confidentiality, which is the prevention of "unauthorized reading...
In computer science curricula, we teach our students to program on their own, while in the "real world," programming is accomplished via cobbling together modules and subroutines stored in repositories that were written by others. Similarly, teaching Cyber Security or any other curricula does not occur in a vacuum. Instructors may want to be imagin...
In October 2010, the paper "Curriculum and Pedagogical Effects of the Creation of a Minor in Cyber Security" was presented at InfoSecCD 2010. It described the issues related to the creation of a minor in Cyber Security at Armstrong Atlantic State University (AASU, and its effects on the curriculum of AASU's Information Technology major. The conclus...
In January 2006, Armstrong Atlantic State University (AASU) offered its first course in Information Security. At the same time, the university received funding for its Cyber Security Research Institute, a non-academic unit closely related to and funded by the U.S. Department of Homeland Security. The establishment of this research institute led the...
As Armstrong Atlantic State University (AASU) enters the wireless world during the Spring 2007 semester, it is important that those connecting to the university's network use notebook computers that are free from viruses and malware. In order to help secure this network, Information Technology students were given practical experience by organizing...
As Armstrong Atlantic State University prepares to enter the wireless world during the 2006-07 academic year, it is important that those connecting to the university's network use notebook computers that are free from viruses and malware. In order to help secure the network, Information Technology students were given practical experience by organiz...
This paper reports on the need for Information Security Awareness educational programs to supplement teaching in Information Security. The need for such a program is demonstrated by findings resulting from a survey of university faculty and staff at Armstrong Atlantic State University conducted from February through April 2005 regarding the informa...
From its humble beginnings as a directory of incoming students named thefacebook.com at Harvard in February 2004, to a mega-site used by the campaign of Barack Obama to harness the power of the youth vote, Facebook has become an international phenomenon. Along with myspace.com, Linkedin.com, and others, social networking web sites have changed the...
The infrastructure of computer networks in the United States is not only vital to our nation's economy, but is also a crucial element of our national security. Professionals in the Information Technology community are routinely concerned with the day-to- day threats of viruses and hacks into these networks. However, it is essential that this commun...
Significant weaknesses in the Wired Equivalency Protocol (WEP) led to the creation of the Wi-Fi Protected Access (WPA) Wired Local Area Network (WLAN) security protocol and the amendment to that protocol, WPA2. Certified by the WiFi Alliance in 2001, WPA[1] was superseded by WPA2 in 2006[1] as being mandatory for usage with the IEEE 802.11i standar...
Projects
Project (1)
Paper for CyCon US 2017 - Cyber Conference sponsored by Army Cyber Institute at West Point