default search action
3. InfoSecCD 2006: Kennesaw, Georgia, USA
- Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006. ACM 2006, ISBN 1-59593-437-5
Pedagogy
- Frank H. Katz:
Campus-wide spyware and virus removal as a method of teaching information security. 1-4 - Erik Hjelmås, Stephen D. Wolthusen:
Full-spectrum information security education: integrating B.Sc., M.Sc., and Ph.D. programs. 5-12 - Robin Snyder:
Ethical hacking and password cracking: a pattern for individualized security exercises. 13-18 - James Walden, Charles E. Frank:
Secure software engineering teaching modules. 19-23 - Blair Taylor, Shiva Azadegan:
Threading secure coding principles and risk analysis into the undergraduate computer science and information systems curriculum. 24-29 - Janine DeWitt, Cynthia Della Torre Cicalese:
Contextual integration: a framework for presenting social, legal, and ethical content across the computer security and information assurance curriculum. 30-40 - Gerald Clevenger:
Incorporating certification and accreditation coursework into network security curriculum. 41-43 - Martin Mink, Felix C. Freiling:
Is attack better than defense?: teaching information security the right way. 44-48 - Michael E. Whitman, Herbert J. Mattord:
Developing the BS-ISA: lessons learned and future directions - sponsored by NSF grant # DUE-0516192. 49-51 - Wasim A. Al-Hamdani:
Knowledge flow with information assurance track. 52-57 - Mark A. Holliday, William C. Kreahling:
Information security and computer systems: an integrated approach. 58-63 - Mário Guimarães:
New challenges in teaching database security. 64-67 - John B. Bowles, Caroline M. Eastman, Csilla Farkas:
Engaging undergraduates in computer security research. 184-190 - Douglas P. Twitchell:
Social engineering in information assurance curricula. 191-193
Practice
- Robert C. Newman:
Cybercrime, identity theft, and fraud: practicing safe internet - network security threats and vulnerabilities. 68-78 - Robin Snyder:
Some security alternatives for encrypting information on storage devices. 79-84 - Guillermo A. Francia III, Tyler S. Gomez:
Steganography obliterator: an attack on the least significant bits. 85-91 - Robin Snyder:
Combining an e-commerce simulation with a cyber-survivor exercise. 92-95 - Guillermo A. Francia III, Monica Trifas, Dorothy Brown, Rahjima R. Francia, Chrissy Scott:
Visualization and management of digital forensics data. 96-101 - Wasim A. Al-Hamdani:
Assessment of need and method of delivery for information security awareness program. 102-108 - Chlotia Posey Garrison:
Encouraging good passwords. 109-112 - Tammy Alexander:
Domain name registrars: are they part of the domain name fraud problem? 113-117 - Thomas Baxley, Jinsheng Xu, Huiming Yu, Jinghua Zhang, Xiaohong Yuan, Joseph Brickhouse:
LAN attacker: a visual education tool. 118-123 - John C. Beachboard, Alma Cole, Mike Mellor, Steven Hernandez, Kregg Aytes, Nelson Massad:
A tentative proposal: improving information assurance risk analysis models for small- and medium-sized enterprises through adoption of an open development model. 194-196
Student papers
- Robert E. Crossler, France Bélanger:
The effect of computer self-efficacy on security training effectiveness. 124-129 - Laurence Holt:
A year affair with security: the development of a security program and manager. 130-135 - Anne M. Payton:
A review of spyware campaigns and strategies to combat them. 136-141 - Peter Phuong Vo, Chau Maggie Vo:
FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. 142-146 - Jason Hill:
The storm ahead: how CALEA will turn VoIP on its head. 147-150 - Cameron Jordan:
Law and privacy: the debate over Radio Frequency Identification (RFID) legislation. 151 - Kim Luong:
The other side of identity theft: not just a financial concern. 152-155 - Michael D. Carroll:
Information security: examining and managing the insider threat. 156-158 - Charles Ohaya:
Managing phishing threats in an organization. 159-161 - Anne M. Payton:
Data security breach: seeking a prescription for adequate remedy. 162-167 - Ray Yeager:
Criminal computer forensics management. 168-174 - James William Rust:
Corporate management of computer forensics evidence. 175-178 - Errol A. Blake:
The management of access controls/biometrics in organizations. 179-183 - Brian A. Pashel:
Teaching students to hack: ethical implications in teaching students to hack at the university level. 197-200 - Syed A. Saleem:
Ethical hacking as a risk management technique. 201-203
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.