- Conference Session
- Topics in Computing and Information Technology-I
- Collection
- 2018 ASEE Annual Conference & Exposition
- Authors
-
Andrew R. Schmitt, Metropolitan State University; Theresa Chasar, Newell Brands; Mangaya Sivagnanam, Ingersoll Rand; Faisal Kaleem, Metropolitan State University
- Tagged Divisions
-
Computing and Information Technology
and indirect (amplified and/or reflected) attack methods 6. Quantifying the number of IoT bots in a botnet of unknown composition 7. Determining the resiliency of target systems during an attack and quantifying the number of devices a target system can withstand while remaining fully functionalAppendix A: Infrastructure Hardware DetailsAppendix B: Python ScriptsServer Side:#Script to establish a server side socket to test maximum bandwidth based on hardware resources#Using a file to send data for an extended period of timeimport socketimport os#VariablesB_size = int(raw_input("Enter the buffer size:\n"))Bind_port = int(raw_input("Enter the port number to connect on:\n"))#Establish the server and listen for connectionsdef
- Conference Session
- Computing and Information Technology Division Technical Session 2
- Collection
- 2020 ASEE Virtual Annual Conference Content Access
- Authors
-
Sin Ming Loo, Boise State University; Liljana Babinkostova
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology
, underpin the need for increasing workforcedevelopment initiatives founded in cybersecurity principles. The workforce shortage is across allcybersecurity domains, yet our adversaries are always advancing, always probing forvulnerabilities in corporate enterprise systems, critical infrastructure systems, and vital nationalsecurity systems. The cyber game is unfair, the defenders have to do everything right everydayand hackers only have to get lucky once.To combat this persistent threat, which is a 24/7 operation, we need all hands on deck. We mustwork to ensure our graduates comprehend cybersecurity; we need people with differentperspectives, approaches, ways of thinking, and methods to solve the cyber challenges we arefacing and will face. We
- Conference Session
- Computing Technology Applications-II
- Collection
- 2018 ASEE Annual Conference & Exposition
- Authors
-
Tamer Omar, California State Polytechnic University, Pomona; Srikanth Venkatesan, California State Polytechnic University, Pomona; Abdelfattah Amamra, California State Polytechnic University, Pomona
- Tagged Divisions
-
Computing and Information Technology
identity and privacy, cloud privacy, wireless information assurance. 2. Cryptography. 3. Systems, networks and sensors security, systems attribution, software security. 4. Attack tolerance, threat attribution. 5. Side channel attacks, backscattering, distributed denial of service (DDOS) attacks. 6. Human-centric security, Security awareness, behavioral aspects. 7. Intel and security analytics in machine learning. 8. Detection and prevention response, surveillance, web tracking. 9. Industrial control systems security, embedded applications, Infrastructure resiliency. 10. Pen testing, BOTNETS, the economics of cybersecurity.The last activity provided by the centers/labs in university services. There is a wide range ofservices
- Conference Session
- Computing and Information Technology Division Technical Session 2
- Collection
- 2020 ASEE Virtual Annual Conference Content Access
- Authors
-
Saeed Al-Haj, Ohio Northern University
- Tagged Divisions
-
Computing and Information Technology
infrastructure that allows conducting experiments in an isolated environment withoutjeopardizing security. To overcome this challenge, this paper presents “Secure-It-Yourself” kit.The kit utilizes Raspberry Pi unit as a development environment for hands-on activities andexercises. The advantage of using Raspberry Pi units is creating a configurable isolated sandboxfor security hands-on exercises without affecting the current lab infrastructure.The corner stone in cybersecurity education is offering a set of engaging projects and exercises bywhich the students get hands-on experience to reinforce concepts covered in the classroom. Thispaper focuses on assembling a “Secure-It-Yourself” kit for students that can be utilized to bringthe awareness of secure
- Conference Session
- Computing and Information Technology Division Technical Session 8
- Collection
- 2021 ASEE Virtual Annual Conference Content Access
- Authors
-
Te-shun Chou, East Carolina University; Biwu Yang, East Carolina University
- Tagged Divisions
-
Computing and Information Technology
. government has placedcybersecurity as a national priority in order to minimize damage from cyber incidents. In thefiscal year of 2019, the President's Budget included $15 billion of budget authority forcybersecurity-related activities to improve the security and resilience capabilities of nationalinformation infrastructures [3].In addition to the efforts made from the government in national cybersecurity protection, it isalso important that everyone should receive a basic training of cybersecurity concepts andtechniques. The National Initiative For Cybersecurity Careers and Studies (NICCS) stated: “Wemust teach science, technology, engineering and math (STEM), and other cyber concepts to allstudents, and educate all students on the secure use of
- Conference Session
- Computing and Information Technology Division Technical Session 2
- Collection
- 2020 ASEE Virtual Annual Conference Content Access
- Authors
-
Alyssa Mendlein, Temple University; Thuy-Trinh Nguyen, Temple University ; Aunshul Rege, Temple University
- Tagged Topics
-
Diversity
- Tagged Divisions
-
Computing and Information Technology
, no. 2, pp. 159-165, 1998.[10] L. Ball, G. Ewan, and N. Coull, “Undermining social engineering using open source intelligence gathering,” in Proceedings of the 4th International Conference on Knowledge Discovery and Information Retrieval, Barcelona, Spain, October 4-7, SciTePress-Science and Technology Publications, 2012, pp. 275-280.[11] A. Keliris, C. Konstantinou, M. Sazos, and M. Maniatakos, “Open source intelligence for energy sector cyberattacks,” Critical Infrastructure Security and Resilience, pp. 261-281, 2019.[12] SANS Institute, “Open-Source Intelligence (OSINT) Gathering and Analysis course,” [Online]. Available: https://www.sans.org/course/open-source-intelligence-gathering.[13] A. M. Shelton, “Teaching