Asee peer logo
Displaying all 12 results
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Xiannong Meng, Bucknell University; Luiz Perrone, Bucknell University; Maurice Aburdene, Bucknell University
Tagged Divisions
Information Systems
2006-1323: HANDS-ON PROJECTS IN WIRELESS AND MOBILE COMPUTERNETWORK COURSESXiannong Meng, Bucknell University XIANNONG MENG is an Associate Professor in the Department of Computer Science at Bucknell University in Lewisburg, Pennsylvania, U.S.A. His research interests include distributed computing, data mining, intelligent Web search, operating systems, and computer networks. He received his Ph.D. in Computer Science from Worcester Polytechnic Institute in Worcester, Massachusetts, U.S.A.Luiz Perrone, Bucknell University LUIZ FELIPE PERRONE is Assistant Professor of Computer Science, at Bucknell University. He has been developing an elective in Computer Security since the spring of 2003
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Yu Cai, Michigan Technological University; Guy Hembroff, Michigan Technological University
Tagged Divisions
Information Systems
2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION ANDDEFENSE SIMULATIONYu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological University. His research interests include network protocols, distributed systems and cyber security. He received his Ph.D. in Computer Science from University of Colorado in 2005. He is a memeber of IEEE and ACM.Guy Hembroff, Michigan Technological University Mr. Guy Hembroff is an Assistant Professor within Michigan Tech University's School of Technology Department. His research interests are within the areas of cyber security, network protocols, encryption methods, health-care
Conference Session
Internet and Distributed Computing
Collection
2006 Annual Conference & Exposition
Authors
Fani Zlatarova, Elizabethtown College
Tagged Divisions
Information Systems
course offered at theauthor’s academic institution. They do not cover the complete set of views of abstraction. Thenewly emerging DB applications dealing with Web-oriented queries and multimedia queries(audiovisual queries, special queries, XML queries, queries performed in mobile environment,and others considered in1, 7, 8, 9, 11, 13) have been considered in the next DB-oriented course,Database Systems Development and Applications. Similar issues have been researched in theReadings and Projects in Computer Science and Information Systems course, and in the out-of-class student seminar on Information Systems, organized by the author.In the introductory DB course, students should be able to easily switch from one to another typeof the expression
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ed Crowley, University of Houston; Cheryl Willis, University of Houston
Tagged Divisions
Information Systems
source tools also provide students with an opportunity to demonstrate critical thinkingskills. For example, in one class project, students analyze a particular security issue, define aspecific problem, survey the available tools, and select an appropriate security tool. The projectincludes both a conceptual problem/solution analysis and a hands-on class demonstration. Ineach of their courses, our students develop and utilize these skills in a structured project thatutilizes open source software and Live CDs.Future WorkFuture activities may include group projects with the goal of creating custom enterprise securitytoolkits. These toolkits will likely contain a diverse collection of Open Source Tools. Anothertype of group project would be for each
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
ofbiometric identification and provides a comparatively inexpensive and unobtrusive method ofhardening the normal login and password process. This Project aims at investigating the validityof using typing dynamics to strengthen security in a computer system. A Keystroke DynamicsAnalysis tool is developed that uses statistical analysis of a user’s typing patterns to performidentity verification.IntroductionThe increasing need for securing access to computer systems and networks from intruders isgrowing rapidly as the type of data and capabilities of these systems is becoming significantlysensitive. To provide access to these systems while preventing illegitimate access is the keyrequirement of modern day computing. Since biometric systems do not
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Frank Kowalkowski, Knowledge Consultants; Gilbert Laware, Purdue University
Tagged Divisions
Information Systems
2006-2016: TEACHING BUSINESS PROCESS IMPROVEMENTS – MAKING THERIGHT CHOICEFrank Kowalkowski, Knowledge Consultants Frank Kowalkowski is President of Knowledge Consultants Inc., a professional services firm founded in 1984. He has 30 years of management consulting and industry experience in manufacturing, distribution, insurance and financial services as well as the public sector. He has been involved with wide range of projects that include e-commerce, application integration, ERP, change management, content management, benchmarking, business performance measurement, business and competitive intelligence, technology deployment and process improvement. He is the author of a 1996 book on
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Tim Lin, California State Polytechnic University-Pomona; Saeed Monemi, California State Polytechnic University-Pomona
Tagged Divisions
Information Systems
: Internet Security (formerly CIS 499) · CIS 481: Computer Forensics · GBA 685: MSBA Project-Adv Computer ForensicsThe college Mt. San Antonio also offers a network security certificate program with 3 courses:CISS 21: Network Vulnerabilities and CountermeasuresCISS 23: Network Analysis and Network Intrusion Detection SystemCISS 25: Network Security and FirewallsBase on the curriculum of the other colleges and departments listed here (and also the curriculamentioned in the ASEE papers), a good information assurance curriculum (or major, focus,option) consists of the following six courses. Note the core courses on OS, Network, andProgramming are also what the authors of reference 1 mentioned in the first paragraph
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Ronald Glotzbach, Purdue University; Nathan Bingham, Purdue University; Meiqi Ren, Purdue University; Dorina Mordkovich, Purdue University
Tagged Divisions
Information Systems
2006-2586: E-STADIUM: REAL-TIME GAME STATISTICS, HIGHLIGHTS, ANDENTERTAINMENTRonald Glotzbach, Purdue University Ronald J. Glotzbach is an Assistant Professor for the Interactive Multimedia Development area in the Department of Computer Graphics Technology at Purdue University’s West Lafayette campus. He is also the Purdue football e-Stadium Project Manager for ITaP. Ronald’s research interests include leading-edge technologies that expand the boundaries of dynamic and interactive content delivered and collaborated on via the graphical communication tool that is the web. Related interests include web-enabling software, dynamic content delivery methods, programming graphics, and integration
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Barry Lunt, Brigham Young University; Joseph Ekstrom, Brigham Young University
Tagged Divisions
Information Systems
commonalities, since they allclaim to be computing disciplines. Analysis of the formal curricula shows that all five programscover: Computer foundational topics Computer programming (including algorithms, implementation, and software quality) Capabilities and limitations of computers (including societal impact) Software lifecycle issues Processes, both computing and professional Advanced computing topics Professionalism (including interpersonal communications, teamwork, management, ethics, and legal constraints) Applications to join theory and skills (including labs, assignments, projects, etc.) Capstone projects
Conference Session
Computing Curriculum
Collection
2006 Annual Conference & Exposition
Authors
Akram Al-Rawi, Zayed University; Azzedine Lansari, Zayed University; Faouzi Bouslama, Zayed University
Tagged Divisions
Information Systems
, encryption, and enterprise-wide security policies.To understand how to approach large network projects, including software or hardware updates or an entire network implementation.Evaluation Procedures:Chapter Quizzes (15, closed book) 20%Lab Projects 30%Network+ Certification Exam (Prometric Testing Center) 50%Course Topics and Certification Objectives Week/ Course Topics Book/ Certificate Period Chapter Objectives 1.1 An Introduction
Conference Session
Security
Collection
2006 Annual Conference & Exposition
Authors
Mario Garcia, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
password recovery, it does lack the rich output providedby LC5 as no report is given other than that of a password having been cracked. Therefore, itmeets only minimal requirements to act as a password auditing application.John the RipperJohn the Ripper is an open source application developed by Openwall Project and now in version1.6 since 1998 can be found at their home page. It was originally developed for UNIX operatingsystems, but a version was ported for Windows as well that will run under DOS can crack AFSpasswords and WinNT LM hashes 9. Since John the Ripper will run under Windows as a DOSapplication, it does not have a graphical user interface and must be called via the command line.However, it does offer a wealth of command line options
Conference Session
DB & Information Integration
Collection
2006 Annual Conference & Exposition
Authors
Phillip Wilson, Texas A&M University-Corpus Christi; John Fernandez, Texas A&M University-Corpus Christi
Tagged Divisions
Information Systems
. Each development team prepared a test scenario based onthe main tasks that the primary Web site users were supposed to be able to accomplish.The professor (J. Fernandez) provided a questionnaire (usability survey) to be used byeach evaluator after the completion of the test scenario. This generalized questionnairewas standardized for use by all evaluators so that it could be compared with the Emogramassessments. Once the student completed the evaluation and the usability questionnaire,he or she was immediately administered the Emogram while targeting the student’sexperience with the Web site evaluated.During the work with the graduate student projects and associated evaluations, Fernandezfollowed the additional step within the protocol to