Skip to main content

Home/ Groups/ CSIA 459
Brandon Kennedy

Web Resource - 0 views

  •  
    I don't know how fancy we are supposed to be with sharing these web resources, but I enjoy twitter because of how fast and easy current events are presented.
Amy Harding

Video: Flame: Trying to Unravel the Mystery of Spying Malware | Watch PBS NewsHour Onli... - 4 views

  •  
    "Flame: Trying to Unravel the Mystery of Spying Malware"
  • ...1 more comment...
  •  
    Two things I found very interesting about Flame is the size of the malware as well as the ability to utilize Bluetooth to collect data. Considering Bluetooth usage has increased in some countries and is automatically turned on by default on cell phones, this could enable a lot of information to be collected.
  •  
    We will see more of this type of modification of Stuxnet and Flame. The bad thing about finding stuff like this, is others who could not have made malware as technically advanced as this, will be able to modify it much easier than if they would have had to design it from scratch.
  •  
    focused on the comment made by the analyst on the differentiation of cyber "war" vs. cyber "espionage" as it appears that Flame is more on cuber espionage since it is desgined to collect infor from specific targets.
Amy Harding

Embrace the cloud computing revolution - with caution | Comment is free | guardian.co.uk - 1 views

  •  
    For your cloud computing assignment
  •  
    I liked this article very much and understand his concerns. It is very hard to trust something that you can't examine. How do cloud computing agencies validate their systems, with there be a GOP security report that tells us what agencies are legitimate. I have to read that top 10 cloud reporting article to see exactly how that was determined.
Shondre Fort

Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - 0 views

  • Schlenoff and his colleagues used their SCORE approach to evaluate technologies as they progressed under two DARPA programs: ASSIST and TRANSTAC. In ASSIST, DARPA is funding efforts to instrument soldiers with wearable sensors—video cameras, microphones, global positioning devices and more—to continuously record activities while they are on a mission. TRANSTAC is driving the development of two-way speech-translation systems that enable speakers of different languages to communicate with each other in real-world situations, without an interpreter. By providing constructive feedback on system capabilities, the SCORE evaluative framework helps to drive innovation and performance improvements.
  •  
    SCORE (System, Component and Operationally Relevant Evaluations) is a unified set of criteria and software tools for defining a performance evaluation approach for complex intelligent systems. It provides a comprehensive evaluation blueprint that assesses the technical performance of a system and its components through isolating and changing variables as well as capturing end-user utility of the system in realistic use-case environments. The SCORE framework has proven to be widely-applicable in nature and equally relevant to technologies ranging from manufacturing to military systems. It has been applied to the evaluation of technologies in DARPA programs that range from soldier-worn sensor on patrol to speech-to-speech translation systems. It is also currently being applied to the assessing the control of autonomous vehicles on a shop floor.
  •  
    From NIST Tech Beat: June 21, 2011 Most industry executives, military planners, research managers or venture capitalists charged with assessing the potential of an R&D project probably are familiar with the wry twist on Arthur C. Clarke's third law*: "Any sufficiently advanced technology is indistinguishable from a rigged demo."
samuelrios

Court Says C.I.A. Must Yield Some Data on Drones - NYTimes.com - 3 views

  •  
    Article supports drones as being an emerging technology. ASSignment1, Part1 Support
  •  
    Interesting article, It seems to me that this is just another one of those cases about flexing the "muscle" of the Freedom of Information Act. In my opinion it is pretty common knowledge that targeted drone strikes are being used to eliminate enemies; so why is it so important here that the C.I.A. has to acknowledge these attacks? What would that accomplish? The media outlets already report on successful drone strikes and now there are even military medals to recognize drone pilots. http://www.fsunews.com/article/20130318/FSVIEW0303/130317001/New-military-medal-stirs-controversy-?odyssey=mod|newswell|text|frontpage|s
  •  
    I just wonder how long it's going to take before something comes out of these attacks. Using these drones to fly into other countries like Pakistan, and "take out" suspected enemies is pretty borderline in my opinion. If this were to happen in America, we would certainly not stand for it, and would declare war on the country that carried out the action. Pushing the button from California on a drone missle is alot like conducting cyber warfare from one country to another. The damage that can be done is becoming greater and greater every day as technology is starting to tie together national infrastructures. In my opinion, drones are the some of the first of the cyber warfare machines.
Phil Kemp

Massive casino scam pulled off via CCTV system compromise - 4 views

  •  
    While society is looking to use technology for it's benefits, there are many pitfalls, and adverse uses for this same technology. This article discusses how the use of CCTV systems for ensuring that players do not cheat was used against the same system, to do the very thing it was protecting against. We as technology professionals should be very congnizant of the security risks that the technology we recommend or put in place, may have alternate uses, which may be used against us, and thereby causing more damage than it helped to protect.
  • ...3 more comments...
  •  
    Good article and I like the site. Haven't been there before. Looks like a good site to find out current news articles for another class I'm taking. Thanks!
  •  
    I read about the scam shortly after it happened, but the article I read didn't provide nearly as many details. Thanks for the article and I think there might be more people unemployed than just the VIP services manager.
  •  
    Phil you are so right about an organization own security technology being used against them. This is a great example of that. It is important when implementing technology to fully analyze its impact, that includes vulnerabilities and threats. A good change managment policy can help reveal problems like this. I wonder if there was an insider involved or maybe the casino failed to properly protect the network.
  •  
    Phil, This is very interesting. You would have thought the casino would have better security than that on their system. It also suprises me that if you were in a game with that much money why did they not see the receiver the person had. A simple pat down could have reveiled it. It is scary what technology can do in the wrong hands. Lee
  •  
    Winning is one thing, but stacking the deck is another. I would have thought that a casino would have a better way of securing their systems. Ben
paksingtham

Growing Data Security Concerns to Drive Global Market for Keystroke and Typing Dynamics... - 4 views

  •  
    I can't see this being used much for single factor authentication, but I could certainly see it being used on top of a username/password setup to bolster the security of that password. Another useful application for this would be to augment an anomaly based IDS running on the user's system. If keystroke patterns/dynamics exceed standard deviation, an alert could be sent to the help desk or security, who could then verify the identity of the user.
  •  
    I could see some companies implementing keystroke and typing dynamics depending on their sector and security posture. However, depending on the sensitivity of the software, they could receive a lot of false positives. I've personally noticed my typing speed fluctuates drastically depending on the time of day. Nevertheless, I could see more companies deploying the software depending of their budget.
  •  
    It seems that there are way to many variables for this technology to really take off. I agree with trevor that there is potential for a high volume of false positives. I also see potential for a high volume of false negatives. This technology seems as though it could end up being extremely frustrating for the end user.
samuelrios

Awlaki Strike Shows U.S. Shift to Drones in Terror Fight - 0 views

  •  
    WASHINGTON - The C.I.A. drone strike that killed Anwar al-Awlaki, the American-born propagandist for Al Qaeda's rising franchise in Yemen, was one more demonstration of what American officials describe as a cheap, safe and precise tool to eliminate enemies. It was also a sign that the decade-old American campaign against terrorism has reached a turning point.
James Thomas

Improving Co-located Collaboration through Intergrating Mobile Devices and Interactive ... - 0 views

  •  
    This article is based on a study conducted to observe and document human collaborative interaction using mobile devices and interactive surfaces.
Seth Molin

Telemedicine: communication technologies that revolutionize healthcare services - 0 views

shared by Seth Molin on 01 Apr 13 - No Cached
  •  
    Article 3 from UMUC library
Alvin Thomas

1 of 4 - 0 views

shared by Alvin Thomas on 01 Apr 13 - No Cached
  •  
    This is 1 of 4 of my sources for annotated bibliography.
Alvin Thomas

2 of 4 - 0 views

  •  
    This is 2 of 4 of my sources for annotated bibliography.
Alvin Thomas

3 of 4 - 0 views

  •  
    This is 3 of 4 of my sources for annotated bibliography.
Brandon Kennedy

Honeypot Annotated Bibliography - 0 views

Alvin Thomas

4 of 4 - 0 views

  •  
    This is 4 of 4 of my sources for annotated bibliography.
« First ‹ Previous 241 - 260 Next › Last »
Showing 20 items per page