Author: Samuel Liles

National Cyber Range Proposal

As part of the experiential learning process students work is posted for comment. Feedback in the comments section is enthusiastically requested. My apologies for requiring users to be logged in the amount of spam was extensive. This particular project was…

Cyber response plan and framework

As part of the experiential learning process students work is posted for comment. The students of the assured systems and design course have completed a document that is a comprehensive look at cyber response and counter measures. Feedback in the comments…

Tech meme: Twitter Users

Twitter users with a bazillion followers are hubs. Twitter users who are retweeted a lot are routers. Twitter users with low follower to following ratios are firewalls. Twitter users who have wildly divergent follower communities are bridges. Twitter users who…

Yet another cyber treatise

With the impending release of the 60 day cyber review and myriad conferences to cover cyber security I wish to put a stick in the ground and make a pronouncement about cyber security, information assurance and security and anybody who…

Into the darkness of cyber warfare

I have been reading extensively about whether cyber warfare exists, whether it is a defensive only engagement, and if it does exist does it actually involve combat. These questions are born upon the back of the military establishment well entrenched…