19 research outputs found

    Goldwater Scholarship Winner

    Get PDF
    University of Dayton senior Raphael Crum has been named a 2016 Barry Goldwater Scholar, marking the second year in a row that a University student was awarded a scholarship from the federally endowed Barry Goldwater Scholarship and Excellence in Education Foundation

    A Discussion on Life Systems Security and the Systems Approach

    Get PDF
    The relationship between information technology and information security historically has been quite reactive. New innovations in information technology have often been accompanied by new security threats that create challenges to its reliability and overall integrity. In this paper, a historical perspective that outlines the evolution in the development of the security function is used as a starting base. Changes in the way security issues are viewed and how this view affects the design and development of secure systems are then postulated. It is proposed that these changes should be incorporated into the security functions of any waterfall development model, and especially during the initial and terminating stages

    Securing Data Transfers: An Integrity Algorithm for Error Recovery Triangulation

    Get PDF
    Transferring data is one of the key operations performed by millions of users every day. Users do this by issuing direct commands, such as file transfer commands, or indirectly as a feature invoked by numerous end-user applications. The most important security characteristic of a successful data exchange is the integrity of that data. The receiver user desires to acquire data that has not been modified through malicious acts, or simple human or machine error. Applications that rely on the Transfer Control Protocol (TCP) as the main mechanism to provide end-to-end reliability, including error and sequence control, do not check the integrity of the file being transmitted prior to the transfer. In this paper, we present an overview of current data transfer mechanisms and their security provisions and propose an internal integrity mechanism that provides a triangulation means of error control through the use of one-way hash functions based on the original file being transferred; and a discussion of the implications and limitations that such a mechanism imparts on data transfer mechanisms

    The role of space in the security and defence policy of Turkey. A change in outlook: Security in space versus security from space

    Get PDF
    Space and security domains are strongly related with each other. Nowadays, space is an indispensable part of security and defence policy, and it is increasingly becoming a critical infrastructure for strategic Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) systems. However, space is vulnerable itself to the new space threats. This study reviews the current and near future space role in Turkey's security and defence policy and aims to address the threats against space based capabilities. To provide security from space, space based systems shall themselves need to be secure in space to warrant the security. The concept of security from space starts with space security, in other words the security in space. This paper also highlights the emerging technological opportunities for these space threats to be secure in space in order to provide the security from space. According to the relevant taxonomy, a categorized opportunity proposal for more robust and resilient space/satellite projects' architecture is proposed for Turkey

    Cyber Terrorism : Political and economic implications

    No full text

    Establishing cyber warfare doctrine

    No full text
    Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national) cyber warfare doctrine (CWD). An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD's possible components, and proposes a national collaborative and discussion framework for obtaining a nation's stakeholder buy-in for such an endeavor.fals

    ABSTRACT Development of a framework for secure patch management

    No full text
    With the growing expansion of Internet connectivity and usage by consumers and merchants, financial institutions and governmental entities, the requirement for stable and secure software is being elevated to the legislative and judicial levels. No longer can software manufacturers disregard this growing requirement in fulfilling their commercial obligations. The issuance of a patch is the beginning and not the end of a software developer’s obligations to its customers and all subsequent parties impacted by its product. In this paper, the authors provide a framework detailing the components of a secure patch management system, a discussion on the necessity of managing and securing each phase/component, and some basic patch issuance concerns with regards to the supporting legal environment

    Abstract

    No full text
    Transferring data is one of the key operations performed by millions of users every day. Users do this by issuing direct commands, such as file transfer commands, or indirectly as a feature invoked by numerous end-user applications. The most important security characteristic of a successful data exchange is the integrity of that data. The receiver user desires to acquire data that has not been modified through malicious acts, or simple human or machine error. Applications that rely on the Transfer Control Protocol (TCP) as the main mechanism to provide end-to-end reliability, including error and sequence control, do not check the integrity of the file being transmitted prior to the transfer. In this paper, we present an overview of current data transfer mechanisms and their security provisions and propose an internal integrity mechanism that provides a triangulation means of error control through the use of one-way hash functions based on the original file being transferred; and a discussion of the implications and limitations that such a mechanism imparts on data transfer mechanisms

    Establishing Cyber Warfare Doctrine

    Get PDF
    Over the past several decades, advances in technology have transformed communications and the ability to acquire, disseminate, and utilize information in a range of environments. Modern societies and their respective militaries have taken advantage of a robust information space through network-centric systems. Because military and commercial operations have increasingly converged, communication and information infrastructures are now high-priority military objectives in times of war. This article examines the theoretical underpinning of current cyber warfare research, what we have learned so far about its application, and some of the emerging themes to be considered; it also postulates the development of a (national) cyber warfare doctrine (CWD). An endeavor of this scale requires lots of considerations and preparation for its development if it is to be cooperatively embraced. This article considers why information technology systems and their supporting infrastructures should be considered legitimate military targets in conflicts, and offers several events that support this supposition. In addition, it identifies the various forms of doctrine that will become the basis for developing a CWD, discusses a CWD\u27s possible components, and proposes a national collaborative and discussion framework for obtaining a nation\u27s stakeholder buy-in for such an endeavor
    corecore