James Scott

James Scott
Institute for Critical Infrastructure Technology · Cybersecurity/Cyber Warfare

About

5
Publications
3,780
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3
Citations
Citations since 2016
5 Research Items
3 Citations
2016201720182019202020212022012345
2016201720182019202020212022012345
2016201720182019202020212022012345
2016201720182019202020212022012345

Publications

Publications (5)
Technical Report
Full-text available
Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data pools, there are limitless possibilities for social engineering and cybe...
Technical Report
Full-text available
K-12 students are the most prevalent and the most invaluable resource the U.S. can utilize in the development of a skilled and formidable cyber-workforce. As the United States grapples with a projected shortage of 1.5 million cybersecurity professionals by 2020, the “digital generation” provides a unique opportunity to address the cyber-talent shor...
Technical Report
Full-text available
With S.J.Res.34, every citizen will have massive amounts of their data exposed when their ISP or a nebulous third-party intentionally or inadvertently fails to adequately secure the information. By drastically expanding that collection, storage, and exchange of data with a few short lines of legislation, Congress has jeopardized the security and pr...
Article
Full-text available
Non-Profit and Non-Government Organizations (NGOs) rely greatly on the use of information technology for both their operations and innovative strategic program initiatives. In a sense, they are no different than any small, medium or large-scale enterprise with regard to computing. Keeping information confidential and free from integrity and privacy...
Technical Report
Full-text available
Just as American and European critical infrastructure executives were beginning to wrap their minds around the devastation of the Office of Personnel Management breach, ransomware erupted onto the scene, followed by concentrated DDoS attacks such as the Mirai botnet attack on Dyn, which enabled a quantum leap for cyber criminals. Now, all techno-fo...

Network

Cited By