• Home
  • UMSL Cybersecurity Home
  • Events

Blog: Cybersecurity Education @ UMSL

~ An interdisciplinary collaboration for developing Cybersecurity talent

Category Archives: Uncategorized

Winrock Int. Farmer to Farmer ICT Assignment: AEMIP063-AET

27 Monday Feb 2017

Posted by Maurice Dawson in Student Projects, Uncategorized

≈ Comments Off on Winrock Int. Farmer to Farmer ICT Assignment: AEMIP063-AET

Tags

africa, usaid, winrock

Share

From November – December 2016, a former cyber security graduate student Dan Redden was awarded approximately $4000.00 for Assignment: AEMIP063-AET, Agriculture Programs Software Training for the Institut Supérieur Agronomic et Vétérinaire de Faranah (ISAV/F) and Students in Faranah, Guinea.

Redden provided technical assistance at Guinea’s largest agricultural university by training professors to use an online open source database system. This system was to allow the university to go from a paper to a paperless environment. The system’s that Redden implemented provided two different options to the university to be able to store their documents. Redden also provided hardware and software needed for the assignment that was not available at the university to allow for an easier integration of the new applications.

View Winrock International volunteer opportunities at https://www.winrock.org/join-us/volunteer/volunteer-opportunities/

- Share/Bookmark -

Link

CFP: International Journal of Hyperconnectivity and the Internet of Things (IJHIoT)

22 Friday Jul 2016

Posted by Maurice Dawson in Uncategorized

≈ Comments Off on CFP: International Journal of Hyperconnectivity and the Internet of Things (IJHIoT)

Share

The International Journal of Hyperconnectivity and the Internet of Things (IJHIoT) promotes innovative, interesting and rigorously developed conceptual and empirical contributions and encourages theory based multi- or interdisciplinary research. This journal covers topics relating to IoT and the current age of hyperconnectivity including security concerns, applications of IoT, development and management of the IoT, wearable computing, IoT for home automation, smart cities, and other environments.

The Editor-in-Chief of the International Journal of Hyperconnectivity and the Internet of Things (IJHIoT) invites authors to submit manuscripts for consideration in this scholarly journal. The following describes the mission, coverage and guidelines for submission to IJHIoT.

View CFP at http://www.igi-global.com/calls-for-papers/international-journal-hyperconnectivity-internet-things/157228

Submit a Paper to the International Journal of Hyperconnectivity and the Internet of Things (IJHIoT)

Editor-in-Chief: Maurice Dawson (University of Missouri – St. Louis, USA)
Published Semi-Annually. Est. 2017.

Mission:

The mission of the International Journal of Hyperconnectivity and the Internet of Things (IJHIoT) is to explore a range of related topics and generate research debates in relation to cyber security, hyperconnectivity, Internet of Things (IoT), Web of Things (WoT), and Internet of Everything (IoE). Targeting researchers, practitioners, academicians, government officials, military professionals and other industry professionals. IJHIoT provides a forum to discuss technical, human, societal, and policy issues in relation to hyperconnectivity, and IoT. Articles published in IJHIoT deal with a vast number of issues concerning usage, failure, success, policies, strategies, security concerns, the development, and integration of IoT applications in organizations in and across developed, emerging and developing nations.

Coverage:
Topics to be discussed in this journal include (but are not limited to) the following:

Hyperconnectivity and IoT topics:

Hyperconnectivity
Internet of Things (IoT)
Web of Things (WoT)
Internet of Everything (IoE)
Service oriented IoT Architecture
IoT Application Programming Interface (API)
IoT platform
IoT devices
IoT management
IoT development
System of systems concepts
IoT and cyber security topics

IoT cyber security:

IoT network security
Cryptography
Data security
IoT asset management
Secure software for IoT
Software logistics for IoT
Security engineering
IoT risk management
IoT platform and environment topics

SCADA platforms:

Smart cities
Data mining
Geographic Information Systems (GIS)
Standard Development Organizations (SDO)
System usability
Technology Adoption
Wearable Computing
Network Architecture

Submission:

Researchers and practitioners are invited to submit their original empirical research articles 5,000-7,000 words in length. Interested authors must consult the journal’s guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/. All submitted articles will be reviewed on a double-blind review basis by no fewer than 3 members of the journal’s Editorial Review Board and 1 Associate Editor. Final decision regarding acceptance/revision/rejection will be based on the reviews received from the reviewers and at the sole discretion of the Editor-in-Chief.

All submissions and inquiries should be directed to the attention of:

Maurice Dawson
Editor-in-Chief
University of Missouri – St. Louis, USA
Email: IJHIoT@igi-global.com

- Share/Bookmark -

UMSL Designated as a National Security Agency (NSA) & Department of Homeland Security (DHS) Center of Academic Excellence (CAE)

27 Wednesday Apr 2016

Posted by Maurice Dawson in Uncategorized

≈ Comments Off on UMSL Designated as a National Security Agency (NSA) & Department of Homeland Security (DHS) Center of Academic Excellence (CAE)

Tags

accreditation, certification, cyber defense, nsa cae

Share

The University of Missouri –St. Louis (UMSL) has been designated as a National Center of Academic Excellence in Cyber Defense Education through academic year 2021.  You can view the status of our accreditation by viewing the NSA’s page at https://www.iad.gov/NIETP/reports/cae_designated_institutions.cfm#M.  UMSL is the second designated institution and the only one in the Greater St. Louis Metro.

Download official letter by clicking here U of MO – St. Louis – CAE-CDE.

nsa-logo-copyDHS_Seal

National Centers of Academic Excellence – Cyber Defense

The National Security Agency (NSA) and the Department of Homeland Security (DHS) jointly sponsor the National Centers of Academic Excellence in Cyber Defense (CAE-CD) program. The goal of the program is to reduce vulnerability in our national information infrastructure by promoting higher education and research in cyber defense and producing professionals with cyber defense expertise for the Nation.

The CAE-CD program comprises the following designations: Four-Year Baccalaureate/Graduate Education (CAE-CDE), Two-Year Education (CAE2Y) and Research (CAE-R). All regionally accredited two-year, four-year and graduate level institutions in the United States are eligible to apply. Prospective schools are designated after meeting stringent CAE criteria and mapping curricula to a core set of cyber defense knowledge units. Schools may also elect to map their curricula to specialized Focus Areas. CAE-CD institutions receive formal recognition from the U.S. Government as well as opportunities for prestige and publicity for their role in securing our Nation’s information systems. Designation as a Center does not carry a commitment of funding from NSA or DHS. Funding opportunities may become available periodically from other sources such as the National Science Foundation.

The initial National CAE in Information Assurance Education (CAE-IAE) program was started by NSA in 1998, with DHS joining as a partner in 2004. The CAE in IA Research component was added in 2008 to encourage universities and students to pursue higher-level doctoral research in cybersecurity. In 2010, the CAE in Two-Year IA Education component was established to afford two-year institutions, technical schools, and government training centers the opportunity to receive such designation.

Complimentary in nature, the CAE-Cyber Operations program focuses on technologies and techniques related to specialized cyber operations (e.g., collection, exploitation, and response) to enhance the national security posture of our Nation.

- Share/Bookmark -

THREAT INTELLIGENCE WEBINAR

05 Tuesday Apr 2016

Posted by Maurice Dawson in Security Education/Conferences/Events, Uncategorized

≈ Comments Off on THREAT INTELLIGENCE WEBINAR

Tags

cyber security, threat intelligence

Share

National CyberWatch has partnered with Threat.Connect to bring you an overview of Threat Intelligence. The webinar will cover what Threat Intelligence is, FREE faculty resources available, and how faculty can easily integrate these resources into their courses.

REGISTER NOW

- Share/Bookmark -

Security Software Supply Chain: Is What You See What You Get?

21 Monday Mar 2016

Posted by Maurice Dawson in Uncategorized

≈ Comments Off on Security Software Supply Chain: Is What You See What You Get?

Tags

Events, ISSA, secure software, supply chain, web conference

Share

Security Software Supply Chain: Is What You See What You Get?

2-Hour live event Tuesday, March 22, 2016
Start Time: 9:00 a.m. US-Pacific/ 12:00 p.m. US-Eastern/ 5:00 p.m. London

Click here to Register! 

Overview:

Software is the foundation of our computer eco-system and, just like in the real world, it doesn’t take a lot to upset them.  In the non-cyber world, it has been often said ‘We are what we eat’. In the Cyber world this is still true–especially when we consider an organizations inclusion (or consumption) of software. When we buy products and include them in our infrastructure, we perform acceptance testing, in order to make sure they work and have no known vulnerabilities. Unfortunately we don’t know what components are in the products. We also don’t know if the product was built entirely by the software provider or did they use components from somewhere else.

This session will cover issues with software supply chain and development operations. It will cover the basics, including the current state of software supply chain analysis, and attempt to provide pointers on how to figure out what is in a supply chain and what the information can be used for.

Moderator

Mark Kadrich
Chief Information Security & Privacy Officer, San Diego Health Connect

For the past 25 years, Mark Kadrich has worked in the security community, building knowledge, and contributing solutions. Most recently, Mr. Kadrich has been working with his colleagues at Emagined Security filling positions as a CISO and a PCI compliance architect. He is responsible for crafting new policy and procedures regarding installation, use, testing, and compliance for both a health information exchange and a large and diverse retail service enterprise. Recently, Mark architected large crypto services environments and secure network environments. He holds degrees in Management Information Systems, Computer Engineering and Electrical Engineering.

Speakers

Michael F. Angelo
CRISC, CISSP
Michael is well known in the security community with his work designing, developing, implementing and deploying security products and architectures for multi-national corporate environments. His work includes participating, driving, and creating security standards, working on corporate policies, national and international legislation, multi-national regulatory issues, and participation in numerous international and national advisory councils. He has been a featured speaker at numerous national and international security conferences including RSA, ISSA, and InfoSec. He has also participated on the RSA national program committee. Currently, he chairs the ISSA International Webinar Committee and is a technology contributor to the U.S. Department of Commerce Information Systems Technical Advisory Council. Michael currently holds 53 U.S. patents, is a former Sigma-Xi distinguished lecturer and is the recipient of the Trusted Computing Platform Alliance (TCPA) lifetime achievement award. In 2011 he was recognized by ISSA as the Security Professional of the Year and in 2013 he was named to the ISSA Hall of Fame.


Jonathan Knudsen
Cybersecurity Engineer, Synopsys
At Synopsys, Jonathan enjoys breaking software and teaching how to make software better. Jonathan is the author of books about 2D graphics, cryptography, mobile application development, Lego robots, and pregnancy. He lives in Raleigh, North Carolina.


Derek E. Weeks
VP and Rugged DevOps Advocate, Sonatype

In 2015, Derek led the largest and most comprehensive analysis of software supply chain practices to date across 106,000 development organizations.  His research detailed the consumption of billions of open source and third-party software components while also shedding new light on the scale of known vulnerable software being ingested by development organizations worldwide.  Derek is a huge advocate of applying proven supply chain management principles into development and application security practices to improve efficiencies, reduce security risks, and sustain long-lasting competitive advantages. He currently serves as vice president and Rugged DevOps advocate at Sonatype. Derek is a distinguished international speaker, having delivered his research at AppSec USA, InfoSec Europe, LASCON, HP Protect, Air Force Cyber Security Forum, and numerous OWASP meet-ups.

Henrik Plate
Senior Security Researcher, SAP SE

Henrik Plate works as a Senior Researcher in the Product Security Research group within SAP since 2007. During this time, he was coordinator and scientific lead of the European FP7 research project PoSecCo, built up an SAP-wide security training for application developers and performed security assessments of SAP applications. Currently, he researches new approaches and tooling for ensuring a secure consumption of third party components in the software supply chain. Before joining the SAP research group, Plate held different positions as a software engineer, and studied computer science and business administration at the University of Mannheim. He holds a diploma from the University of Mannheim and is a CISSP.

- Share/Bookmark -

These Are the Data Centers Where Cybercriminals Hide

21 Monday Mar 2016

Posted by Maurice Dawson in Uncategorized

≈ Comments Off on These Are the Data Centers Where Cybercriminals Hide

Tags

criminal, Cyber Security Awareness, data center

Share

An excellent article was written by Lorenzo Franceschi-Bicchierai on how hackers, criminals, and hacktivists store their information and whom they go to for web hosting.

See full article at http://motherboard.vice.com/read/the-data-centers-where-cybercriminals-hide-symantec-data-havens-documentary?trk_source=recommended or read on LinkedIn at https://www.linkedin.com/pulse/most-dangerous-town-internet-where-cybercrime-goes-hide-dawson?published=t

- Share/Bookmark -

The Case For Ubuntu: Linux Operating System Performance and Usability for Use in Higher Education in a Virtualized Environment

19 Saturday Mar 2016

Posted by Maurice Dawson in Uncategorized

≈ Comments Off on The Case For Ubuntu: Linux Operating System Performance and Usability for Use in Higher Education in a Virtualized Environment

Tags

information systems, Linux, operating system, Ubuntu

Share

The Case for UBUNTU Linux Operating System Performance and Usability for Use in Higher Education in a Virtualized Environment

Maurice Dawson, University of Missouri-St. Louis
Brittany DeWalt, Alabama A&M University
Simon Cleveland, Nova Southeastern University

Abstract
The use of Linux based Operating Systems (OS) in the classroom is increasing, but there is little research to address usability differences between Windows and Linux based OSs. Moreover, studies related to the ability for students to navigate effectively between Ubuntu 14.04 Long Term Support (LTS) and Windows 8 OSs are scant. This research aims to bridge the gap between modern Linux and Windows Oss, as the former represents a viable alternative to eliminate licensing costs for educational institutions. Preliminary findings, based on the analysis of the System Usability Scale results from a sample of 14 students, demonstrated that Ubuntu users did not require technical support to use the system, while the majority found little inconsistency in the system and regarded it as well integrated.

Recommended Citation
Dawson, Maurice; DeWalt, Brittany; and Cleveland, Simon, “The Case for UBUNTU Linux Operating System Performance and Usability for Use in Higher Education in a Virtualized Environment” (2016). SAIS 2016 Proceedings. Paper 23.
http://aisel.aisnet.org/sais2016/23

View presentation at

The Case for Ubuntu: Linux Operating System Performance and Usability for Use in Higher Education in a Virtualized Environment from Maurice Dawson

Proceeding will be published https://aisnet.org/.

Download or view paper here by clicking the following The_Case_for_UBUNTU_Linux_Operating_Syst.

- Share/Bookmark -

Book Chapter from CAE-CDE 4Y

17 Thursday Mar 2016

Posted by Maurice Dawson in Uncategorized

≈ Comments Off on Book Chapter from CAE-CDE 4Y

Tags

book chapter, cae, research

Share

Communication, Technology, and Cyber Crime in Sub-Saharan Africa

Dustin Bessette (National Graduate School of Quality Management, USA), Jane A. LeClair (National Cybersecurity Institute at Excelsior College, USA), Randall E. Sylvertooth (National Cybersecurity Institute at Excelsior College, USA) and Sharon L. Burton (Florida Institute of Technology, USA)

Abstract

As a region that is rapidly developing its technology base, Sub-Saharan Africa is experiencing many of the issues associated with the benefits of cyber technology as well as its many negative sides. This paper discusses mobile and internet technologies currently being utilized in Sub-Saharan Africa as well as some of the major cybersecurity concerns threatening networks in the region that are associated with the new economic growth on the African continent. Such topics will include a viable increased awareness of news, historical events, and recent gatherings of information on this main topic.

Bessette, D., LeClair, J. A., Sylvertooth, R. E., & Burton, S. L. (2015). Communication, Technology, and Cyber Crime in Sub-Saharan Africa. In M. Dawson, & M. Omar (Eds.)New Threats and Countermeasures in Digital Crime and Cyber Terrorism (pp. 286-297). Hershey, PA: Information Science Reference. doi:10.4018/978-1-4666-8345-7.ch016
View chapter at http://www.igi-global.com/chapter/communication-technology-and-cyber-crime-in-sub-saharan-africa/131409
- Share/Bookmark -

“Webinar: President Obama’s National Cybersecurity Action Plan of 2016”

17 Thursday Mar 2016

Posted by Maurice Dawson in Uncategorized

≈ Comments Off on “Webinar: President Obama’s National Cybersecurity Action Plan of 2016”

Tags

cyber security, Cyber Security Awareness, meeting, Obama

Share

Webinar: President Obama’s National Cybersecurity Action Plan of 2016

Organized by National Cybersecurity Institute

“President Obama’s National Cybersecurity Action Plan of 2016” webinar on March 24, 2016 at 2:00 pm eastern.

Sign up for free at http://www.eventbrite.com/e/webinar-president-obamas-national-cybersecurity-action-plan-of-2016-tickets-22499466510

- Share/Bookmark -
← Older posts

Recent

  • U.S. Air Force Internship Program
  • U.S. Bank Awards three Cybersecurity Scholarships to UMSL students
  • UMSL to lead the Midwest Association of Information Systems 2018 Conference
  • Federal IT/Cybersecurity Job Fair in Maryland
  • Cybersecurity Virtual Career Fair

Categories

  • Community Resources
  • Cyber Competitions
  • Cybersecurity Students
  • Guest Speaker
  • Jobs
  • Security Education/Conferences/Events
  • Security Tips
  • Student Projects
  • Student Research Papers
  • Uncategorized

Archives

  • November 2017
  • October 2017
  • September 2017
  • February 2017
  • October 2016
  • August 2016
  • July 2016
  • May 2016
  • April 2016
  • March 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2014
  • September 2014

Blogs and Sites

  • UMSL Cybersecurity Home
  • Information Systems Department
  • Math and Computer Science
  • Criminology and Criminal Justice
  • STLCyberCon.org

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Proudly powered by WordPress Theme: Chateau by Ignacio Ricci.