Abstract Wearable technology is the buzz word in the tech world these days. There has always been a push towards smaller, cheaper computing power. Processor have gotten so small that we are starting to put them in different locations all…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
Glass Acquisition and Analysis
Glass Acquisition and Analysis Faisal Talal Alaskandrani Purdue University Due Date : 14/03/2014 CNIT 58100 CFM Under the direction of Dr. Samuel Liles Abstract Google Glass developed by Google is an embedded device with an android operating…
Examples of pre-history (before 1980) high technology attacks
The following are all from the very excellent book on high tech crime written in the late 1970s. I reviewed this book awhile back. Whiteside, Thomas, “Computer Capers: Tales of electronic thievery, embezzlement, and fraud”, Thomas Y. Crowel, New York,…
Cybersecurity and Incident Response Laboratory (CIRL) Proposal
The following is an example of a proposal I wrote to bring enhanced information assurance and security education to the College of Technology. Though the proposal never went forward I thought it might be interesting for others to read. There…
Cyber
Cyber is a technology mediated domain of human and systems interactions. Where: Human <-> Human Human <-> System System <-> System Human being biological entity as sender, receiver, sensor, perceiver. System being a technology as sender, receiver, sensor, perceiver. Why…
Prognostication: How to identify the next super power
In my class I told my students this simple test. With each successive significant change in power structure of geo-politics there were associated technologies. I like to think about exploitative technologies rather than destructive, but I digress. My test for…
People divided over impact of ‘Deep Web’
2014 Information Security Wish List
It is easy to say how bad things are going to be, or to cry foul at the rough treatment by bad guys. The victim mentality of the western world is literally boring me to tears. Whining about how big…
2014 Prognostications
I stopped evaluating my previous prognostications year to year. It just wasn’t worth it when some troll wanted to argue over whether something happened 80 percent or 65 percent. So I’ll let the reader judge my 2013 prognostications and see…
Research Note: Tracing the Twitter card phenomenon
In a Twitter discussion (>140 characters at a time) with Chris J @rattis about tracing credit cards from pictures on Twitter posted by users, to dissemination, and subsequent use. The following experimental protocol was developed. The scenario being examined is…
Research note: Cyber defense of tactical networks
Why this word cyber? There are dozens of government definitions for cyberspace the environment defined by the concept of cyber itself. Such a nebulous concept such as cyber is going to cause angst and at any major hacker conference and…
On the equivalence of corporate and government snooping
I’m going to disagree with the espoused equivalence of government snooping and corporate snooping. The former is enabled by the latter but that is still conflation of the two issues. A consumer opts in when they utilize a service, asks…
Invisible attacks: Maritime shipping critical infrastructure attacks
This gallery contains 1 photo →
Cyber Monday Safe Shopping Tips
The last few years I’ve gotten asked by the media to talk about this. Here are my notes on best practices for staying safe shopping online over the holidays. I welcome ideas. Remember this is for “joe average user” and…
Purdue team takes home top honors in DC3 challenge
I would like to congratulate four CIT graduate students in their win of the Defense Cyber Crime Center (DC3) cyber forensics challenge. Team “Or11–” came together and was composed of these four students. William Ellis Jacob Kambic Eric Katz Sydney…