Skip to main content

Home/ CSIA 459/ Contents contributed and discussions participated by Lee Bry

Contents contributed and discussions participated by Lee Bry

Lee Bry

Hack an iPhone in 60 seconds - 1 views

  •  
    Check this out. Just when you think it's safe to go into the water!
Lee Bry

Cyber Threat: On the Front Lines with Shawn Henry - 3 views

  •  
    Our departing top cyber official reflects on how the FBI has adapted to an evolving threat. Shawn Henry is executive assistant director of the FBI's Criminal, Cyber, Response, and Services Branch. He served as assistant director of the Cyber Division from September 2008 to January 2010, Note: Shawn Henry retired from the FBI on March 31, 2012. This is an excellent interview with Shawn Henry describing todays cyber actors
Lee Bry

SANS Newsbites - 2 views

shared by Lee Bry on 09 Jul 13 - No Cached
  •  
    A site that you can subscribe to bi-weekly updates to computer security as a way to keep current on potential emerging threats.
Lee Bry

Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments - 1 views

  •  
    Other applications of cloaking other than hiding information during transmission, is the hiding of communication source location(s); knowing where the communications are happening is a real threat for communicators. Spatial cloaking, ability to hide physical objects, in this instance loosely used, provides the ability to keep peer-to-peer (P2P) communication sources anonymous with regards to geographic constraints; however, temporal cloaking is also employed to hide a person's whereabouts during specified times.
Lee Bry

Vendor aims to 'cloak' WEP - 0 views

  •  
    Although quite dated, this reference provides the great disparity of what was thought to be cloaking in 2007 vs. in the present time. The article describes in some detail the need and proposed process for protecting WEP encryption for legacy devices in the protection of credit card users.
Lee Bry

'Temporal cloaking' could bring more secure optical communications - 0 views

  •  
    The process of temporal cloaking is better understood as written by this author. The invention of this technological advance dates back to 2012 by researches from Purdue University while Joseph Lukens, Daniel leaird and Andrew Weiner researched and achieved the capability using off-the-shelf technology commonly used commercial optical communications vs. complex, ultrafast-pulsing lasers. The researchers discovered that manipulating the timing of light pulse propagation causes a phase inversion of the light or zeroing (canceling the light intensity). The zero region is the hole where there is nothing; any data that is placed in the zero region would be cloaked.
Lee Bry

A temporal cloak at telecommunication data rate - 1 views

  •  
    The authors describe the most recent interactions with temporal cloaking and how it hides events in time altered spatial gaps that are not detected. The thought is that data can be hidden in the gaps, and thus providing a practical method for securing information during transmissions.
Lee Bry

RSA 2013: Is Cryptography Still Necessary? - 0 views

  •  
    An interesting article that is relevant to this weeks (week2) discussion questions regarding cryptology. Needed or not needed?
Lee Bry

Enterprise Network Guide - 1 views

  •  
    White paper describing impacts and benefits to new technologies and the requirments and pressures for organizations to implement them (Cyber nightmare?)
1 - 9 of 9
Showing 20 items per page