Skip to main content

Home/ Groups/ CSIA 459
1More

Cyber War Over Spam Slows Access for Internet Users | PBS NewsHour | March 27, 2013 - 2 views

  •  
    PBS Newshour video on the clash between Spamhaus and Cyberbunker.
3More

http://www.safegov.org/media/46155/measuring_what_matters_final.pdf - 3 views

  •  
    Agencies must establish a unique baseline threat assessment and automate monitoring to ensure good cybersecurity, says a SafeGov report released Tuesday.
  •  
    Safegov has an interesting approach to cybersecurity. I feel the framework an effective way to approach security. Ben
  •  
    The legislation proposal aims at achieving cybersecurity due to increased network threats in government and in organizations. Educating the public and the use of cyber security technologies have great impacts on government agencies. Our government department comply with NIST and ISO/IEC, and the two bodies help in enhancing privacy and security in the national and international levels. It is important to identify efficient operational, technical and management security controls in a comprehensive computer security plan. Risk assessment in management control assists in identification of risks and in putting up risk assessment policies. Operational controls have their basis on restrictions to access information resources and in user permissions. Sam
1More

Malware goes mobile - 1 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
2More

Your cell phone is spying on you - 2 views

  •  
    Accessed at the UMUC Library, so enter your last name and barcode/EMPLID.
  •  
    Ken, This was a very good article. Nothing that I had not heard in the recent couple years, but you can see how society is being tracked to the point that no civil liberties union will be able to do anything anymore. The byproducts of the features that everyone wants, i.e. for convenience, are what allow these agencies monitoring and mining all of this data, with our silent approval. The use of this data will only continue to rise, and we will soon see if the secure state we are building will do more good than bad.
1More

[Short Paper] Understanding the user experience of secure - 1 views

  •  
    Source 1 of 5 for my Annotated bibliography. I know we don't have to post anymore, but figured I would incase someone else may want to read, or gather information.
1More

Exploring Touch-screen Biometrics for User Identification on Smart Phones - 0 views

  •  
    Source 2 of 5 for my Annotated Bibliography on the implementation of biometrics to secure smart phone technologies.
1More

ENTERPRISES HAVE SMART-PHONE BIOMETRIC OPTIONS: Facial recognition, fingerprint identi... - 0 views

  •  
    Source 3 of 5 for my Annotated Bibliography on the implementation fo biometrics to secure smart phone technologies.
1More

Cell Phone-Based Biometric Identification - 0 views

  •  
    Source 4 of 5 for my Annotated Bibliography on the implementation of biometrics to secure smart phone technologies
1More

Arm's Flex when Responding Call for Implicit User Authentication in Smartphone - 0 views

  •  
    Link goes to UMUC library, so you will need to provide last name and pass if you want to access.
1More

BIOMETRIC AUTHENTICATION THROUGH A VIRTUAL KEYBOARD FOR SMARTPHONES - 0 views

  •  
    Link goes to UMUC Library Resources so you will need to provide last name and pass to access.
1More

Collaboration in Multicloud Computing Environments - 0 views

  •  
    This article describes a new concept in development for cloud computing which involves combining cloud services into a collection of clouds to form what it defines as a multicloud environment called cloud mashups.
1More

Awlaki Strike Shows U.S. Shift to Drones in Terror Fight - 0 views

  •  
    WASHINGTON - The C.I.A. drone strike that killed Anwar al-Awlaki, the American-born propagandist for Al Qaeda's rising franchise in Yemen, was one more demonstration of what American officials describe as a cheap, safe and precise tool to eliminate enemies. It was also a sign that the decade-old American campaign against terrorism has reached a turning point.
1More

Blueprint for a Secure Cyber Future - 30 views

  •  
    This document is used for your Week 1 discussion questions.
1More

WiMAX Forum - 26 views

  •  
    In Week 4 you will click around this website and select on area to talk about during the discussion questions.
1More

National Webcast: Cyber Security Emerging Trends and Threats for 2013 - 40 views

  •  
    This webcast is part of your Week 4 required reading/watching. Click on Archived Recording Now Available link and the video will open. On the right side of the screen you will see segments and you can click through the video and/or have to break the video down into smaller chunks.
1More

Cyber War! - 32 views

shared by Amy Harding on 06 Mar 13 - No Cached
  •  
    Click through this Cyber War website.
1More

Anonymous attacks against the DNS Root Servers. What's true and what's not? - 28 views

  •  
    (ISC)2 Blog: for Week 5
6More

Biometrics and Cyber Security - 8 views

  •  
    Review the presentation.
  • ...3 more comments...
  •  
    This article does mention balancing some weaknesses of biometrics. The one weakness that is common right now among these systems is the use of usernames and passwords to form a secondary means of accessing the system once the biometrics no longer work. With the implementation of multi-modal systems, this could be resolved. The article also discusses international based systems, which could be difficult, personal information is a source of contention between many countries. Where is the information stored, and what laws become enforceable depending on the users point of presence?
  •  
    Interesting article thank you for posting it. As Phil and the article mentioned where is this information stored. The security of this information is deeply concenring. Not that I am a conspiracy theorist but I really do not want my biometric information to be stored on some database. I remember when my daughter was young there was a push to have your child's DNA sample taken and stored in case it was ever needed in the event the child was kidnapped or lost. After thinking about it back then I just did not see how the government having her DNA sample was a good thing. Of course if she ever comitted a crime I would like to think that I would want her punished for the crime but being a parent I also know that I would do anything to protect her, so why would I give the government a readily available DNA sample for them to identify her with. In the event a sample was needed because of some terrible event happening to her one could be provided through other methods. Just my thoughts.
  •  
    I just posted up an article on fooling biometric fingerprint scanners, Facial scanners can be fooled with photos http://thehackernews.com/2011/11/android-facial-recognition-based.html The Danger is that while one can get a new password or smart card if the old is compromised, You only have one face, two eyes and 10 fingers to use for ID and can't get new ones when someone figures out how to comprimise them.
  •  
    Thanks for the posting especially since my project deals with Ambient Intelligence wherein biometrics can be an integral part of its implementation. One of the most common and frequent incidents in Service Management is authentication. Whether it is with entering secure facilities or logging into computer systems both in the office and remotely, people tend to forget their credentials. Consequently, this causes a loss in productivity as someone tries to regain their access to systems or for system administrators to provide them with temporary access. Ambient intelligence and biometrics may seem as a viable solution since the physical characteristics is intrinsic in each individual. This presentation presents me with the cybersecurity flaws and weaknesses that should be mitigated.
  •  
    Biometrics is always something I have found to be fascinating. Because like this article stated no one knows who you are on the other end of that computer so being able to authenticate that in some sort of method is a great thing
1More

The 15 worst data security breaches of the 21st Century - CSO Online - Security and Risk - 9 views

  •  
    Interesting read, the Dept. of VA breach is a good reminder about physical security. It seems that quite often we focus so much on the technical that the fundamental is overlooked. It find it interesting that they have Stuxnet on this list. It is my understanding that Stuxnet was not really a data breach but more of a process breach.
« First ‹ Previous 201 - 220 Next › Last »
Showing 20 items per page