East Carolina University

Displaying 1-24 of 24 results

  • White Papers // Jul 2013

    Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth

    The defense in depth methodology was popularized in the early 2000's amid growing concerns for information security; this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the...

    Provided By East Carolina University

  • White Papers // Jun 2013

    Security Threats on Cloud Computing Vulnerabilities

    Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a \"Realistic\" network environment. In previous years, the number of people using cloud services...

    Provided By East Carolina University

  • White Papers // Mar 2013

    Cloud Testing for Mobile Software Systems Concept and Prototyping

    This paper describes an approach for increasing the effectiveness of mobile software system testing. A Cloud Testing Of Mobile Systems (CTOMS) framework is presented in the form of a cloud service that provides the ability to run tests on a variety of remote mobile devices. This framework is based on...

    Provided By East Carolina University

  • White Papers // Aug 2012

    Improving Network Security: Next Generation Firewalls and Advanced Packet Inspection Devices

    Standard firewalls alone can no longer protect the enterprise from Internet dangers; new technologies such as next generation firewalls and advanced packet inspection devices can improve security around the user's gateways. Why do the authors need to improve firewalls at the perimeter? In the beginning there was the Internet and...

    Provided By East Carolina University

  • White Papers // Jun 2012

    Examining the Social Networks of Malware Writers and Hackers

    A substantive body of research has emerged exploring the social dynamics and subculture of computer hacking. Few, however, have considered the structure of social networks in the hacker community due in part to the lack of visible information about active hackers or malware writers. The authors' research focuses on the...

    Provided By East Carolina University

  • White Papers // Apr 2012

    Cloud Providers that Support IPv6

    Any organization in the planning stages of transitioning to the cloud and/or IPv6 should architect the transition with both in mind instead of separately tackling each. Moving to the cloud is a natural progression for organizations recognizing the need for agility while also lowering the total cost of ownership. With...

    Provided By East Carolina University

  • White Papers // Jan 2012

    Framework for Testing Cloud Platforms and Infrastructures

    Cloud computing, which a relatively new approach is to distributed computing, uses cloud infrastructures that automatically scale to support an application's hardware requirements, and therefore, must have high reliability in order to meet user expectations. To achieve a high level of quality and reliability, cloud platforms and infrastructures must be...

    Provided By East Carolina University

  • White Papers // Jul 2011

    Path Planning for Mobile Robots Using Iterative Artificial Potential Field Method

    In this paper, a new algorithm is proposed for solving the path planning problem of mobile robots. The algorithm is based on Artificial Potential Field (APF) methods that have been widely used for path planning related problems for more than two decades. While keeping the simplicity of traditional APF methods,...

    Provided By East Carolina University

  • White Papers // Apr 2011

    Cyber Security Threats Detection Using Ensemble Architecture

    This paper describes an ensemble design for cyber security threats detection, which fuses the results from multiple classifiers together to make a final assessment decision. For promoting both speed and accuracy in the detection performance, only some of the features in traffic data are selected for each base classifier. In...

    Provided By East Carolina University

  • White Papers // Nov 2010

    Network Intrusion Detection - A Case Study on the Effectiveness of Sax2 for Home Users

    Included within this paper is an evaluation into the effectiveness of the Sax2 intrusion detection system for home use. This paper first explains the various methods of intrusion detection systems: host-based and network-based. This paper will then explain the various attacks that a typical network intrusion detection system must be...

    Provided By East Carolina University

  • White Papers // Oct 2010

    Frameworks For Establishing And Evaluating Internal Controls: A Primer And Case Study

    A summary of frameworks commonly used by business organizations to establish and evaluate internal controls is provided together with an example of a recently implemented Control Self Assessment (CSA) project. Using the CSA methodology in a start-up operation, the process of identifying key business processes, risks to those processes, and...

    Provided By East Carolina University

  • White Papers // Oct 2010

    Motivation And Monetary Incentives: A Closer Look

    Do higher levels of variable pay reduce salesperson intrinsic motivation? The pattern of findings from past sales management studies are intriguing and may suggest self-determination concepts are applicable. Testing this applicability on a cross-section of industrial salespeople, the authors found pay plans with higher variable proportions can lead to higher...

    Provided By East Carolina University

  • White Papers // Jul 2010

    Security at Every Level: Password Policies in Preventing Attacks

    The already complex nature of the nation's technological infrastructure becomes even more complicated when it is understood that every level of security ultimately affects all other levels. A common security measure found among all levels of infrastructure is the use of passwords. However, passwords can be easily be compromised with...

    Provided By East Carolina University

  • White Papers // Apr 2010

    Cloud Computing - Storm Clouds or Is It Smooth Flying?

    It once was that applications had to be downloaded and/or installed on one's own computer in order to function. As computer communication technology has progressed, there has been an increasing movement towards web-based applications, where the actual application functions takes place on a distant rather than local computer. With the...

    Provided By East Carolina University

  • White Papers // Apr 2010

    802.11 Wireless Options: Uncovering the Reality of Common Security Practices

    The past decade's large increase in wireless devices leaves the security of those devices very much in a state of fluctuation. Unfortunately, what many users think to be the standard techniques used to implement a secure wireless network may not actually make the network truly secure enough to provide the...

    Provided By East Carolina University

  • White Papers // Mar 2010

    Probabilistic Assessment of Effectiveness of Software Testing for Safety-Critical Systems

    This paper provides the results of experimental evaluation of effectiveness of pair-wise testing. This paper considers a non-traditional area of pair-wise testing application, namely using pair-wise approach for testing logical expressions. A tool has been developed for experimental numerical investigation. This tool generates faults of various specific types and applies...

    Provided By East Carolina University

  • White Papers // Jun 2009

    Using Visual Technologies to Promote Excellence in Computer Science Education

    The purposes of this paper are to promote excellence in computer science by suggesting a cohesive innovative approach to fill well documented deficiencies in current computer science education, justify (using the authors' and others anecdotal evidence from both the classroom and the real world) why this approach holds great potential...

    Provided By East Carolina University

  • White Papers // Apr 2009

    Running Title: Investigating SANS/CWE Top 25 Programming Errors

    On January 12, 2009, experts from more than 30 cyber security organizations jointly released a consensus list of the top 25 most dangerous programming errors (http://www.sans.org/top25errors/). This list attempts to boil down the more than 700 possible causes of software security issues to the ones that are so prevalent and...

    Provided By East Carolina University

  • White Papers // Jan 2009

    Denial-of-Service Attacks and Prevention

    A significant security problem for computer resources is the constant attacks from outsiders, making the resources unavailable to its intended users. The motives behind the malicious attacks may vary. For example, it could be for the sake of pulling a prank or a difference in political views with the affected...

    Provided By East Carolina University

  • White Papers // Jan 2009

    Using Honeypots to Reduce IT Security Violations

    Honeypots are becoming a widely used resource in Information Technology Security to gather data on hackers and their methodology of attacking a particular organization. This paper presents a general overview of honeypot technology, some advantages and disadvantages of honeypots, history of honeypots, legal issues of honeypots, and honeypot methods used...

    Provided By East Carolina University

  • White Papers // Jan 2009

    USB 3.0

    USB 3.0 is an emerging technology that will enhance the current USB 2.0 standard in numerous ways. The demand for large hard drives and devices, such as cameras and jump drives, in recent years has led to the bottleneck of the speed of USB 2.0 corresponding to the USB devices....

    Provided By East Carolina University

  • White Papers // Jan 2009

    Fundamental Momentum, Credit Ratings Changes, And Informed traders

    One of the most controversial current issues in finance is the apparent slowness of credit rating agencies to downgrade firms' debt. For example, the U.S. Congress held hearings on October 22, 2008 to investigate "The role played by the rating agencies in the financial crisis". The slowness issue arises from...

    Provided By East Carolina University

  • White Papers // Dec 2008

    A Closer Look at Ethical Hacking and Hackers

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. Hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything...

    Provided By East Carolina University

  • White Papers // Jul 2008

    ITIL V3 Improves Information Security Management

    IT Service Management is becoming a must have for any organization that provides IT Services as its core business function. ITIL (IT Infrastructure Library) is a best practices framework that helps businesses aligns their IT services with their business objectives. The ITIL V3 framework is the newest version of ITIL...

    Provided By East Carolina University

  • White Papers // Jan 2012

    Framework for Testing Cloud Platforms and Infrastructures

    Cloud computing, which a relatively new approach is to distributed computing, uses cloud infrastructures that automatically scale to support an application's hardware requirements, and therefore, must have high reliability in order to meet user expectations. To achieve a high level of quality and reliability, cloud platforms and infrastructures must be...

    Provided By East Carolina University

  • White Papers // Jul 2008

    ITIL V3 Improves Information Security Management

    IT Service Management is becoming a must have for any organization that provides IT Services as its core business function. ITIL (IT Infrastructure Library) is a best practices framework that helps businesses aligns their IT services with their business objectives. The ITIL V3 framework is the newest version of ITIL...

    Provided By East Carolina University

  • White Papers // Jan 2009

    Denial-of-Service Attacks and Prevention

    A significant security problem for computer resources is the constant attacks from outsiders, making the resources unavailable to its intended users. The motives behind the malicious attacks may vary. For example, it could be for the sake of pulling a prank or a difference in political views with the affected...

    Provided By East Carolina University

  • White Papers // Jan 2009

    Using Honeypots to Reduce IT Security Violations

    Honeypots are becoming a widely used resource in Information Technology Security to gather data on hackers and their methodology of attacking a particular organization. This paper presents a general overview of honeypot technology, some advantages and disadvantages of honeypots, history of honeypots, legal issues of honeypots, and honeypot methods used...

    Provided By East Carolina University

  • White Papers // Jan 2009

    USB 3.0

    USB 3.0 is an emerging technology that will enhance the current USB 2.0 standard in numerous ways. The demand for large hard drives and devices, such as cameras and jump drives, in recent years has led to the bottleneck of the speed of USB 2.0 corresponding to the USB devices....

    Provided By East Carolina University

  • White Papers // Apr 2010

    802.11 Wireless Options: Uncovering the Reality of Common Security Practices

    The past decade's large increase in wireless devices leaves the security of those devices very much in a state of fluctuation. Unfortunately, what many users think to be the standard techniques used to implement a secure wireless network may not actually make the network truly secure enough to provide the...

    Provided By East Carolina University

  • White Papers // Jul 2010

    Security at Every Level: Password Policies in Preventing Attacks

    The already complex nature of the nation's technological infrastructure becomes even more complicated when it is understood that every level of security ultimately affects all other levels. A common security measure found among all levels of infrastructure is the use of passwords. However, passwords can be easily be compromised with...

    Provided By East Carolina University

  • White Papers // Dec 2008

    A Closer Look at Ethical Hacking and Hackers

    Due to the advance technology of the Internet, the government, private industry and the everyday computer user have fears of their data or private information being comprised by a criminal hacker. Hacking is not only widespread, but is being executed so flawlessly that the attackers compromise a system, steal everything...

    Provided By East Carolina University

  • White Papers // Oct 2010

    Frameworks For Establishing And Evaluating Internal Controls: A Primer And Case Study

    A summary of frameworks commonly used by business organizations to establish and evaluate internal controls is provided together with an example of a recently implemented Control Self Assessment (CSA) project. Using the CSA methodology in a start-up operation, the process of identifying key business processes, risks to those processes, and...

    Provided By East Carolina University

  • White Papers // Oct 2010

    Motivation And Monetary Incentives: A Closer Look

    Do higher levels of variable pay reduce salesperson intrinsic motivation? The pattern of findings from past sales management studies are intriguing and may suggest self-determination concepts are applicable. Testing this applicability on a cross-section of industrial salespeople, the authors found pay plans with higher variable proportions can lead to higher...

    Provided By East Carolina University

  • White Papers // Apr 2009

    Running Title: Investigating SANS/CWE Top 25 Programming Errors

    On January 12, 2009, experts from more than 30 cyber security organizations jointly released a consensus list of the top 25 most dangerous programming errors (http://www.sans.org/top25errors/). This list attempts to boil down the more than 700 possible causes of software security issues to the ones that are so prevalent and...

    Provided By East Carolina University

  • White Papers // Mar 2010

    Probabilistic Assessment of Effectiveness of Software Testing for Safety-Critical Systems

    This paper provides the results of experimental evaluation of effectiveness of pair-wise testing. This paper considers a non-traditional area of pair-wise testing application, namely using pair-wise approach for testing logical expressions. A tool has been developed for experimental numerical investigation. This tool generates faults of various specific types and applies...

    Provided By East Carolina University

  • White Papers // Nov 2010

    Network Intrusion Detection - A Case Study on the Effectiveness of Sax2 for Home Users

    Included within this paper is an evaluation into the effectiveness of the Sax2 intrusion detection system for home use. This paper first explains the various methods of intrusion detection systems: host-based and network-based. This paper will then explain the various attacks that a typical network intrusion detection system must be...

    Provided By East Carolina University

  • White Papers // Apr 2010

    Cloud Computing - Storm Clouds or Is It Smooth Flying?

    It once was that applications had to be downloaded and/or installed on one's own computer in order to function. As computer communication technology has progressed, there has been an increasing movement towards web-based applications, where the actual application functions takes place on a distant rather than local computer. With the...

    Provided By East Carolina University

  • White Papers // Jun 2009

    Using Visual Technologies to Promote Excellence in Computer Science Education

    The purposes of this paper are to promote excellence in computer science by suggesting a cohesive innovative approach to fill well documented deficiencies in current computer science education, justify (using the authors' and others anecdotal evidence from both the classroom and the real world) why this approach holds great potential...

    Provided By East Carolina University

  • White Papers // Jan 2009

    Fundamental Momentum, Credit Ratings Changes, And Informed traders

    One of the most controversial current issues in finance is the apparent slowness of credit rating agencies to downgrade firms' debt. For example, the U.S. Congress held hearings on October 22, 2008 to investigate "The role played by the rating agencies in the financial crisis". The slowness issue arises from...

    Provided By East Carolina University

  • White Papers // Jul 2011

    Path Planning for Mobile Robots Using Iterative Artificial Potential Field Method

    In this paper, a new algorithm is proposed for solving the path planning problem of mobile robots. The algorithm is based on Artificial Potential Field (APF) methods that have been widely used for path planning related problems for more than two decades. While keeping the simplicity of traditional APF methods,...

    Provided By East Carolina University

  • White Papers // Apr 2011

    Cyber Security Threats Detection Using Ensemble Architecture

    This paper describes an ensemble design for cyber security threats detection, which fuses the results from multiple classifiers together to make a final assessment decision. For promoting both speed and accuracy in the detection performance, only some of the features in traffic data are selected for each base classifier. In...

    Provided By East Carolina University

  • White Papers // Apr 2012

    Cloud Providers that Support IPv6

    Any organization in the planning stages of transitioning to the cloud and/or IPv6 should architect the transition with both in mind instead of separately tackling each. Moving to the cloud is a natural progression for organizations recognizing the need for agility while also lowering the total cost of ownership. With...

    Provided By East Carolina University

  • White Papers // Jun 2013

    Security Threats on Cloud Computing Vulnerabilities

    Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a \"Realistic\" network environment. In previous years, the number of people using cloud services...

    Provided By East Carolina University

  • White Papers // Jul 2013

    Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth

    The defense in depth methodology was popularized in the early 2000's amid growing concerns for information security; this paper will address the shortcomings of early implementations. In the last two years, many supporters of the defense in depth security methodology have changed their allegiance to an offshoot method dubbed the...

    Provided By East Carolina University

  • White Papers // Mar 2013

    Cloud Testing for Mobile Software Systems Concept and Prototyping

    This paper describes an approach for increasing the effectiveness of mobile software system testing. A Cloud Testing Of Mobile Systems (CTOMS) framework is presented in the form of a cloud service that provides the ability to run tests on a variety of remote mobile devices. This framework is based on...

    Provided By East Carolina University

  • White Papers // Aug 2012

    Improving Network Security: Next Generation Firewalls and Advanced Packet Inspection Devices

    Standard firewalls alone can no longer protect the enterprise from Internet dangers; new technologies such as next generation firewalls and advanced packet inspection devices can improve security around the user's gateways. Why do the authors need to improve firewalls at the perimeter? In the beginning there was the Internet and...

    Provided By East Carolina University

  • White Papers // Jun 2012

    Examining the Social Networks of Malware Writers and Hackers

    A substantive body of research has emerged exploring the social dynamics and subculture of computer hacking. Few, however, have considered the structure of social networks in the hacker community due in part to the lack of visible information about active hackers or malware writers. The authors' research focuses on the...

    Provided By East Carolina University