摘要 :
When people talk about hacking and social networks, they're not referring to the common definition of hacking, which is using malicious code or backdoors in computer networks to damage systems or steal proprietary information. Hac...
展开
When people talk about hacking and social networks, they're not referring to the common definition of hacking, which is using malicious code or backdoors in computer networks to damage systems or steal proprietary information. Hacking into social networks requires very little technical skill. It's much more of a psychological game using information on personal profiles to win a complete stranger's trust. Facebook offer privacy settings for their users but they don't the give the users a simple and easier way to edit them or use them.
收起
摘要 :
Geographic Combatant Commands (GCC) do not have the structure in place to respond to Computer Network Attack (CNA) against Department of Defense (DoD) networks or to initiate Computer Network Exploitation (CNE) or CNA in response ...
展开
Geographic Combatant Commands (GCC) do not have the structure in place to respond to Computer Network Attack (CNA) against Department of Defense (DoD) networks or to initiate Computer Network Exploitation (CNE) or CNA in response to a cyber incident in their areas of responsibility. This paper will provide the definitions required to understand the issues that confront operations in cyberspace. It will provide an overview of the legal issues, technical issues, and will provide a recommendation for the structure necessary to enable the GCCs to overcome those issues and to effectively leverage the capabilities provided by U.S. Cyber Command in support of operations within their area of responsibility. This paper recommends the creation of a Joint Cyber Functional Component Command as part of the GCC structure to integrate cyberspace operations into their contingency plans and to enable response to cyberspace incidents within their area of responsibility.
收起
摘要 :
User studies are a critical component in the evaluation of the user interface components of tools where direct algorithmic performance comparison is not applicable. Optimally, these studies would use domain experts as the study su...
展开
User studies are a critical component in the evaluation of the user interface components of tools where direct algorithmic performance comparison is not applicable. Optimally, these studies would use domain experts as the study subjects to maximize the relevance of the results. However, often insufficient numbers of domain experts are available for the user studies in which case nonexperts must be used as substitutes. The challenge is to be able to sufficiently engage the nonexperts, such that they can adequately perform in the study to acquire meaningful results. This report examines the development of a conceptual game (gamification) that would aid nonexperts in identifying with their role and the tasks they must perform such that multiple presentations of the underlying data can be effectively evaluated.
收起
摘要 :
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth study. In this paper we present a first step toward...
展开
While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth study. In this paper we present a first step towards an assessment based on monitoring network activity (anonymized for user privacy) of 20,000 residential DSL customers in a European urban area, roughly 1,000 users of a community network in rural India, and several thousand dormitory users at a large US university. Our study focuses on security issues that overtly manifest in such data sets, such as scanning, spamming, payload signatures, and contact to botnet rendezvous points. We analyze the relationship between overt manifestations of such activity versus the 'security hygiene' of the user populations (anti-virus and OS software updates) and potential risky behavior (accessing blacklisted URLs). We find that hygiene has little correlation with observed behavior, but risky behavior--which is quite prevalent--more than doubles the likelihood that a system will manifest security issues.
收起