Skip to main content

Home/ Groups/ CSIA 459
glenn_g

Cloud computing in Cyberwarfare - 0 views

  •  
    If you want to know about cloud computing or the Flame virus, you need to read this article
Jeremy Croghan

ScienceDirect.com - Procedia Engineering - A Review of Physical Attacks and Trusted Pla... - 0 views

  •  
    "The design of sensors that are small, low cost, low power and combined with its ability to be left unattended has made it more viable and indirectly promotes its popularity for future solutions in various real-life challenges. However, in sensor network, the nodes are physically accessible by adversaries and have been known to expose cryptographic materials such as the encryption keys and other important data in the sensor nodes"
glenn_g

Terrorists use smartphone technology to create invisible networks - 1 views

  •  
    Part of my cyberwarfare paper
Jeremy Croghan

ScienceDirect.com - Procedia Engineering - Remote Upper Limb Tracking System (RULTS) By... - 0 views

  •  
    This paper describes the technology used to track the position of upper limb motion while providing users data about the limbs use.
Michael Austin

Security in Near Field Communication (NFC): Strengths and Weaknesses - 0 views

  •  
    A detailed analysis of the functioning of NFC and the vulnerabilities associated with it.
  •  
    Michael, I like the way the paper talked about the strengths and weaknesses of NCF and how to work with them. Ben
Ben Garey

US military gets into the 3D printing business - 0 views

  •  
    This is great and the Army is on to something.
  •  
    Ben, I was listening to a story on the radio the other day can you imagine someone having the capability to print a gun with all its components. Wow scary…. Article: 3D-Printed Guns and Violent Video Games Tuesday, January 29, 2013 http://www.wnyc.org/shows/newtechcity/2013/jan/29/ Additional Article on 3D printing copyright concerns: As 3-D Printing Becomes More Accessible, Copyright Questions Arise by Steve Henn February 19, 2013 3:01 AM http://www.npr.org/blogs/alltechconsidered/2013/02/19/171912826/as-3-d-printing-become-more-accessible-copyright-questions-arise Sam Rios
Amy Harding

http://www.safegov.org/media/46155/measuring_what_matters_final.pdf - 3 views

  •  
    Agencies must establish a unique baseline threat assessment and automate monitoring to ensure good cybersecurity, says a SafeGov report released Tuesday.
  •  
    Safegov has an interesting approach to cybersecurity. I feel the framework an effective way to approach security. Ben
  •  
    The legislation proposal aims at achieving cybersecurity due to increased network threats in government and in organizations. Educating the public and the use of cyber security technologies have great impacts on government agencies. Our government department comply with NIST and ISO/IEC, and the two bodies help in enhancing privacy and security in the national and international levels. It is important to identify efficient operational, technical and management security controls in a comprehensive computer security plan. Risk assessment in management control assists in identification of risks and in putting up risk assessment policies. Operational controls have their basis on restrictions to access information resources and in user permissions. Sam
Ben Garey

3D printing - 0 views

  •  
    I put this in my Bibilography.
Ben Garey

US Army Deploys 3D Printing Labs to Battlefield - 1 views

  •  
    Here is more on 3D printing and the ways the army is using it.
Ben Garey

3D printing - 0 views

  •  
    Here is something from Fox News about 3D printing and the benefits to the army.
Ben Garey

3D printing - 1 views

shared by Ben Garey on 31 Mar 13 - Cached
  •  
    Here is something to look at about 3D printing.
Michael Austin

A Comprehensive Study of Google Wallet as an NFC Application - 0 views

  •  
    As the title suggests, this is a detailed paper on the implementation and security concerns associated with Google Wallet and NFC.
Michael Austin

Strengths and Weaknesses of Near Field Communication (NFC) Technology - 0 views

  •  
    A paper discussing how NFC technology works, what it's vulnerabilities are, and how to counteract them.
« First ‹ Previous 241 - 260 of 336 Next › Last »
Showing 20 items per page