2013 European Intelligence and Security Informatics Conference (EISIC 2013) Uppsala, Sweden August IEEE Catalog Number: ISBN:

Size: px
Start display at page:

Download "2013 European Intelligence and Security Informatics Conference (EISIC 2013) Uppsala, Sweden August IEEE Catalog Number: ISBN:"

Transcription

1 2013 European Intelligence and Security Informatics Conference (EISIC 2013) Uppsala, Sweden August 2013 IEEE Catalog Number: ISBN: CFP1305R-POD

2 2013 European Intelligence and Security Informatics Conference EISIC 2013 Table of Contents Message from General Chairs...xi Message from Program Chairs...xii Organization...xiii Long Papers The Effect of Personality Type on Deceptive Communication Style...1 Tommaso Fornaciari, Fabio Celli, and Massimo Poesio Issues for the Next Generation of Criminal Network Investigation Tools...7 Uffe Kock Wiil Countering Plagiarism by Exposing Irregularities in Authors' Grammar...15 Michael Tschuggnall and Günther Specht A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work...23 Tove Gustavi, Maja Karasalo, and Christian Mårtenson How "Digital" is Traditional Crime?...31 Lorena Montoya, Marianne Junger, and Pieter Hartel Probability Analysis of Cyber Attack Paths against Business and Commercial Enterprise Systems...38 Dmitry Dudorov, David Stupples, and Martin Newby Analyzing Social Media Content for Security Informatics...45 Richard Colbaugh and Kristin Glass False Event Detection for Mobile Sinks in Wireless Sensor Networks...52 Yuichi Sei and Akihiko Ohsuga Recent Advances in the Development of a Long-Text-Input Keystroke Biometric Authentication System for Arbitrary Text Input...60 John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, and Charles C. Tappert v

3 The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM Approach...67 Fabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux, and Kilian Stoffel Crime Ridges: Exploring the Relationship between Crime Attractors and Offender Movement...75 Justin Song, Valerie Spicer, Patricia Brantingham, and Richard Frank A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior...83 Anders Holst and Björn Bjurling Challenges in Information Fusion Technology Capabilities for Modern Intelligence and Security Problems...89 James Llinas Short Papers Semantic Linking and Contextualization for Social Forensic Text Analysis...96 Zhaochun Ren, David van Dijk, David Graus, Nina van der Knaap, Hans Henseler, and Maarten de Rijke Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document Analysis Kyle Goslin and Markus Hofmann Increasing NER Recall with Minimal Precision Loss Jasper Kuperus, Cor J. Veenman, and Maurice van Keulen Digital-Forensics Based Pattern Recognition for Discovering Identities in Electronic Evidence Hans Henseler, Jop Hofste, and Maurice van Keulen Cyber Crime in Privately Held Information Systems: Personal Data at Stake Mariëlle den Hengst and Martijn Warnier Crime and Its Social Context: Analysis Using the Self-Organizing Map Xingan Li and Martti Juhola Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction Methods M. Saravanan, Rakhi Thayyil, and Shwetha Narayanan Visual Analysis of Heterogeneous Networks Bisharat Rasool Memon and Uffe Kock Wiil Semi-automatic Ontology Maintenance in the Virtuoso News Monitoring System Florence Amardeilh, Wessel Kraaij, Martijn Spitters, Corné Versloot, and Sinan Yurtsever vi

4 Privacy and Security in Cyberspace: Training Perspectives on the Personal Data Ecosystem Joni A. Amorim, Rose-Mharie Åhlfeldt, Per M. Gustavsson, and Sten F. Andler Integration of Media Sources for Situation Analysis in the Different Phases of Disaster Management: The QuOIMA Project Gerhard Backfried, Johannes Göllner, Gerald Qirchmayr, Karin Rainer, Gert Kienast, Georg Thallinger, Christian Schmidt, and Andreas Peer Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management Lisa Rajbhandari Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification Luca Mazzola, Aris Tsois, Tatyana Dimitrova, and Elena Camossi Semantic Data Management: Sensor-Based Port Security Use Case Anna Fensel, Michael Rogger, Tove Gustavi, Andreas Horndahl, and Christian Mårtenson Physiological Signals: The Next Generation Authentication and Identification Methods!? Egon L. van den Broek and Martijn Spitters Tools and Methods for Security: Stimulating the Skill to Philosophize Iordanis Kavathatzopoulos, Ryoko Asai, and Mikael Laaksoharju Towards Offensive Cyber Counterintelligence: Adopting a Target-Centric View on Advanced Persistent Threats Johan Sigholm and Martin Bang National Security and Social Media Monitoring: A Presentation of the EMOTIVE and Related Systems Martin D. Sykora, Thomas W. Jackson, Ann O Brien, and Suzanne Elayan Decentralized Fully Redundant Cyber Secure Governmental Communications Concept Jyri Rajamäki, Paresh Rathod, and John Holmström Visualization of Container Movements through a Web-Based Geographical Information System Tatyana Velikova Dimitrova, Aris Tsois, and Elena Camossi Threats to Peace: Threat Perception and the Persistence or Desistance of Violent Conflict Amy Sliva, Mikhail Malyutov, Glenn Pierce, and Xin Li Reconstruction and Exploration: Applications in Criminology Dennis Andersson and Mirko Thorstensson vii

5 The Intelligence Cycle as a Tool for Effective Information Security Infrastructure Design Carlos Francisco Lerma Reséndez Law Enforcement Authorities' Legal Digital Evidence Gathering: Legal, Integrity and Chain-of-Custody Requirement Jyri Rajamäki and Juha Knuuttila Keystroke Biometric Studies on Password and Numeric Keypad Input Ned Bakelman, John V. Monaco, Sung-Hyuk Cha, and Charles C. Tappert Detecting Key Players in Criminal Networks Using Dynalink Andrew J. Park and Herbert H. Tsang Societal Cyberwar Theory Applied: The Disruptive Power of State Actor Aggression for Public Sector Information Security Jan Kallberg, Bhavani Thuraisingham, and Erik Lakomaa Poster Papers Automated Counter-Terrorism Leslie Ball and Matthew Craven Fast Name Searching on GPU V.F. Pais and D.S. Ciobanu A New Redundant Tracking System for Emergency Response Jyri Rajamäki, Paresh Rathod, and Pasi Kämppi Radiated Emission from Handheld Devices with Touch-Screen LCDs Kamaruddin Abdul Ghani, Kaharudin Dimyati, Khadijah Ismail, and Latifah Sarah Supian Organization Network Construction and Understanding Based on Photo Face Recognition Li Bo, Sun Duo-Yong, Fu Ju-Lei, and Lin Zi-Han Analysis of Terrorist Groups on Facebook Ala Berzinji, Frzand Sherko Abdullah, and Ali Hayder Kakei Assessment of Damage and Protective Capacity of Buildings Exposed to Weapon Effects Sebastian Bernhardsson and Rickard Forsén Service Standardization with Utility Computing and Service Oriented Architecture as a Tool for Public Protection and Disaster Relief Jyri Rajamäki and Paresh Rathod A Pilot Study of Using Honeypots as Cyber Intelligence Sources Urban Bilstrup and Magdalena Rosenberg Browse and Search in Maritime Document Collections Valentina Dragos viii

6 Forensic Data Recovery from Android OS Devices: An Open Source Toolkit Patrick Dibb and Mohammad Hammoudeh Cloud Forensics: A Technical Approach to Virtual Machine Acquisition Louis Antani Holt and Mohammad Hammoudeh Trusting Open Source Information Marianela García Lozano A Tool for Visualizing and Analyzing Users on Discussion Boards Amendra Shrestha The Past, Present and Future of Text Classification Niklas Zechner WIBC Long Papers Document Fraud Detection at the Border: Preliminary Observations on Human and Machine Performance Monica Gariup and Gustav Soederlind Exploiting Twitter for Border Security-Related Intelligence Gathering Jakub Piskorski, Hristo Tanev, and Alexandra Balahur WIBC Short Papers Towards e-passport Duplicate Enrollment Check in the European Union Moazzam Butt, Sandra Marti, Alexander Nouak, Jörg Köplin, R. Raghavendra, and Guoqiang Li The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation Jeffrey L. Jenkins, Jim Marquardson, Jeffrey G. Proudfoot, Joseph S. Valacich, Elyse Golob, and Jay F. Nunamaker Mobile Digital Services for Border Protection: Standardization of Emergency Response Vehicles Jyri Rajamäki Don t Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony Debra L. Tower, Matthew L. Jensen, Norah E. Dunbar, and Aaron C. Elkins Modeling Border Traffic Flow Using Cell Phone Header Packets Joe S. Valacich, David W. Wilson, Jay F. Nunamaker, and Elyse Golob Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test Jeffrey Gainer Proudfoot ix

7 WIBC Practitioner Papers OptaSense Distributed Acoustic and Seismic Sensing Performance for Multi-threat, Multi-environment Border Monitoring Gregory Duckworth, Archibald Owen, Jerry Worsley, and Henry Stephenson A Multi-modal Biometric Fusion Implementation for ABC Systems Daniel Cuesta Cantarero, David Antonio Pérez Herrero, and Fernando Martín Méndez Managing the Border, Smartly Sandrine Trochu and Olivier Touret The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World Chris Hurrey Astute: Increased Situational Awareness through Proactive Decision Support and Adaptive Map-Centric User Interfaces Bart Adams and Frank Suykens Author Index x

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

BIG DATA AND ANALYTICS

BIG DATA AND ANALYTICS BIG DATA AND ANALYTICS Björn Bjurling, bgb@sics.se Daniel Gillblad, dgi@sics.se Anders Holst, aho@sics.se Swedish Institute of Computer Science AGENDA What is big data and analytics? and why one must bother

More information

RUAG Cyber Security. More security for your data

RUAG Cyber Security. More security for your data RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso Cyber Attacks Protecting National Infrastructure Student Edition Edward G. Amoroso ELSEVIER. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann

More information

The Human Factor of Cyber Crime and Cyber Security

The Human Factor of Cyber Crime and Cyber Security The Human Factor of Cyber Crime and Cyber Security Challenges: September 11th has marked an important turning point that exposed new types of security threats and disclosed how cyber criminals pursuit

More information

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities

SICSA* Scottish Informatics and Computer Science Alliance. Cyber Security in Scottish Universities SICSA* Scottish Informatics and Computer Science Alliance Cyber Security in Scottish Universities Dr Martin Beaton Cyber Security Business Development Executive What is SICSA? Collaboration of Scottish

More information

Ed Ferrara, MSIA, CISSP eferrara@temple.edu. Fox School of Business

Ed Ferrara, MSIA, CISSP eferrara@temple.edu. Fox School of Business MIS 5208 Week 4 Cybersecurity & Fraud Ed Ferrara, MSIA, CISSP eferrara@temple.edu Hacking Source: www.youtube.com Computer Crime A cyber breach is any event that intentionally or unintentionally causes

More information

Computer Concepts And Applications CIS-107-TE. TECEP Test Description

Computer Concepts And Applications CIS-107-TE. TECEP Test Description Computer Concepts And Applications CIS-107-TE This TECEP tests content covered in a one-semester course in computer concepts and applications. It focuses on an overview of computers, including historical

More information

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Security, and Intelligence

Security, and Intelligence Machine Learning Forensics for Law Enforcement, Security, and Intelligence Jesus Mena CRC Press Taylor &. Francis Group Boca Raton London NewYork CRC Press is an imprint of the Taylor & Francis Croup,

More information

BENTON COUNTY FELONY SENTENCINGS FOR THE MONTHS OF MAY, JUNE & JULY, 2009

BENTON COUNTY FELONY SENTENCINGS FOR THE MONTHS OF MAY, JUNE & JULY, 2009 BENTON COUNTY FELONY SENTENCINGS FOR THE MONTHS OF MAY, JUNE & JULY, 2009 Sentences for felony-level crimes in Minnesota are determined by utilizing the Minnesota Sentencing Guidelines, which designate

More information

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci

Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci 1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks

More information

Cyber Security Incident Management

Cyber Security Incident Management Cyber Security Incident Management Dr Syed Naqvi syed.naqvi@bcu.ac.uk Outline Introduction Stages of Cyber Incident Response Challenges of Cyberspace Best practices 2 3 Cyber Incident Response 4 Preparation

More information

Jan van den Berg. Delft University of Technology. Faculty of Technology, Policy and Management, section of ICT

Jan van den Berg. Delft University of Technology. Faculty of Technology, Policy and Management, section of ICT 1 From From information information security security to cyber cyber warfare: warfare: some some paradigm paradigm shifts shifts and and research research challenges challenges Jan van den Berg Delft University

More information

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery

More information

IJSER Figure1 Wrapper Architecture

IJSER Figure1 Wrapper Architecture International Journal of Scientific & Engineering Research, Volume 5, Issue 5, May-2014 24 ONTOLOGY BASED DATA INTEGRATION WITH USER FEEDBACK Devini.K, M.S. Hema Abstract-Many applications need to access

More information

Fostering Incident Response and Digital Forensics Research

Fostering Incident Response and Digital Forensics Research Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

The Next Generation Security Operations Center

The Next Generation Security Operations Center The Next Generation Security Operations Center Vassil Barsakov Regional Manager, CEE & CIS RSA, the Security Division of EMC 1 Threats are Evolving Rapidly Criminals Petty criminals Unsophisticated Organized

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

v. 03/03/2015 Page ii

v. 03/03/2015 Page ii The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course

More information

Cloud computing based big data ecosystem and requirements

Cloud computing based big data ecosystem and requirements Cloud computing based big data ecosystem and requirements Yongshun Cai ( 蔡 永 顺 ) Associate Rapporteur of ITU T SG13 Q17 China Telecom Dong Wang ( 王 东 ) Rapporteur of ITU T SG13 Q18 ZTE Corporation Agenda

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government

More information

NSF Workshop on Big Data Security and Privacy

NSF Workshop on Big Data Security and Privacy NSF Workshop on Big Data Security and Privacy Report Summary Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 Acknowledgement NSF SaTC Program for support Chris Clifton and

More information

Cyber Security for SCADA/ICS Networks

Cyber Security for SCADA/ICS Networks Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And

More information

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University

SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in

More information

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

Strategy for Mobile ID

Strategy for Mobile ID Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy

Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy Statement National Strategy for Trusted Identities in Cybersecurity Creating Options for Enhanced Online Security and Privacy We thank the administration for this valuable opportunity to engage in a national

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

Click to edit Master title style

Click to edit Master title style Click to edit Master title style UNCLASSIFIED//FOR OFFICIAL USE ONLY Dr. Russell D. Richardson, G2/INSCOM Science Advisor UNCLASSIFIED//FOR OFFICIAL USE ONLY 1 UNCLASSIFIED Semantic Enrichment of the Data

More information

DEPARTMENT OF HOMELAND SECURITY

DEPARTMENT OF HOMELAND SECURITY DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border

More information

TUSKEGEE CYBER SECURITY PATH FORWARD

TUSKEGEE CYBER SECURITY PATH FORWARD TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

Crime Mapping and Crime Prevention

Crime Mapping and Crime Prevention Crime Mapping and Crime Prevention David Weisburd and Tom McEwen Editors CRIME PREVENTION STUDIES Volume 8 Criminal Justice Press Monsey, New York, U.S.A. 1997 CRIME PREVENTION STUDIES Ronald V. Clarke,

More information

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against

More information

HOUSE ENROLLED ACT No. 1009

HOUSE ENROLLED ACT No. 1009 Second Regular Session 118th General Assembly (2014) PRINTING CODE. Amendments: Whenever an existing statute (or a section of the Indiana Constitution) is being amended, the text of the existing provision

More information

Cyberspace Forensics Readiness and Security Awareness Model

Cyberspace Forensics Readiness and Security Awareness Model Cyberspace Forensics Readiness and Security Awareness Model Aadil Al-Mahrouqi Sameh Abdalla Tahar Kechadi Abstract The goal of reaching a high level of security in wire- less and wired communication networks

More information

ORGANIZADOR: APOIANTE PRINCIPAL:

ORGANIZADOR: APOIANTE PRINCIPAL: ORGANIZADOR: APOIANTE PRINCIPAL: Miguel Gomes 912412885 luismiguel_gomes@symantec.com Alliances Portugal, Africa, Brasil Coverage One of the biggest CSP worlwide Tec. Inovator Strong Cloud Bet and investment

More information

The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Embedded systems, networks and protocols research group. Ondřej Ryšavý 3rd Annual Conference of IT4Innovation 21.10.2014

Embedded systems, networks and protocols research group. Ondřej Ryšavý 3rd Annual Conference of IT4Innovation 21.10.2014 Embedded systems, networks and protocols research group Ondřej Ryšavý 3rd Annual Conference of IT4Innovation 21.10.2014 Embedded systems, networks and protocols research group Task: Design of embedded

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the

More information

ICT Barriers, High Tech Crime, and Police

ICT Barriers, High Tech Crime, and Police ICT Barriers, High Tech Crime, and Police Mitchell F. Rice, Ph.D. Fellow, National Academy of Public Administration (Washington, DC) Professor of Political Science Mail Stop 4348 Texas A&M University College

More information

Predictive Cyber Defense A Strategic Thought Paper

Predictive Cyber Defense A Strategic Thought Paper Predictive Cyber Defense A Strategic Thought Paper Don Adams Vice President, Chief Technology Officer, Worldwide Government TIBCO Software Federal, Inc 2 Summary The art and science of multi-sensor data

More information

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013

The University of Alabama at Birmingham. Information Technology. Strategic Plan 2011 2013 The University of Alabama at Birmingham Information Technology Strategic Plan 2011 2013 Table of Contents Message from the Vice President... 3 About UAB... 4 About UAB Information Technology Meeting needs

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

可 视 化 与 可 视 计 算 概 论. Introduction to Visualization and Visual Computing 袁 晓 如 北 京 大 学 2015.12.23

可 视 化 与 可 视 计 算 概 论. Introduction to Visualization and Visual Computing 袁 晓 如 北 京 大 学 2015.12.23 可 视 化 与 可 视 计 算 概 论 Introduction to Visualization and Visual Computing 袁 晓 如 北 京 大 学 2015.12.23 2 Visual Analytics Adapted from Jim Thomas s slides 3 Visual Analytics Definition Visual Analytics is the

More information

Rapid Aerial Assessment of Post Incident Damage for Enhanced Situational Awareness

Rapid Aerial Assessment of Post Incident Damage for Enhanced Situational Awareness Rapid Aerial Assessment of Post Incident Damage for Enhanced Situational Awareness 2014 Conference on Disaster Mitigation, Preparedness, Response and Sustainable Reconstruction: Science and Technology

More information

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com Outline of Information Security Introduction Impact of information Need

More information

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 420 THE CORPORATE ROLE IN HOMELAND SECURITY

STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 420 THE CORPORATE ROLE IN HOMELAND SECURITY STATE UNIVERSITY OF NEW YORK COLLEGE OF TECHNOLOGY CANTON, NEW YORK COURSE OUTLINE JUST 420 THE CORPORATE ROLE IN HOMELAND SECURITY Prepared By: Paul R. Bowdre SCHOOL OF SCIENCE, HEALTH AND CRIMINAL JUSTICE

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

Some Thoughts on the Future of Cyber-security

Some Thoughts on the Future of Cyber-security Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions

More information

Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice

Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice Siemens Intelligence Platform Agenda Challenges Requirements Intelligence Tools System Aspects Summary 2 Did you ever wonder If the person flying into your country at a particular date every month is visiting

More information

InfoSec Academy Forensics Track

InfoSec Academy Forensics Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

2011 Cyber Security and the Advanced Persistent Threat A Holistic View 2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem

More information

September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS

September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS September 8th 10:30 AM 12:00 PM AM01: Sustainable Transportation Performance Measures: Best Practices September 8th 10:30 AM

More information

On the European experience in critical infrastructure protection

On the European experience in critical infrastructure protection DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV ratchevv@yahoo.com @ratchevv DCAF/CSDM 1 This presentation

More information

Security in the Cloud an end to end Problem

Security in the Cloud an end to end Problem ID WORLD Abu Dhabi 18-19 March 2012 Cloud Computing & Mobile Applications Dr. Andrew Jones Programme Chair for Information Security Khalifa University of Science, Technology and Research, Abu Dhabi Security

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Biometrics and Cyber Security

Biometrics and Cyber Security Biometrics and Cyber Security Key Considerations in Protecting Critical Infrastructure Now and In The Future Conor White, Chief Technology Officer, Daon Copyright Daon, 2009 1 Why is Cyber Security Important

More information

Hybrid Multi-channel and Redundant Tracking System in Emergency Response

Hybrid Multi-channel and Redundant Tracking System in Emergency Response Hybrid Multi-channel and Redundant Tracking System in Emergency Response JYRI RAJAMÄKI, PARESH RATHOD and PASI KÄMPPI Laurea SID Leppavaara Laurea University of Applied Sciences Espoo FINLAND {jyri.rajamaki,

More information

www.wipro.com Mobile Testing Preparing for a fast-changing mobile world. Sudheer M, Practice Head - Mobility Testing and Automation

www.wipro.com Mobile Testing Preparing for a fast-changing mobile world. Sudheer M, Practice Head - Mobility Testing and Automation www.wipro.com Mobile Testing Preparing for a fast-changing mobile world. Sudheer M, Practice Head - Mobility Testing and Automation Table of Contents 03----------------------------------------------------Introduction

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

The Geography of International terrorism

The Geography of International terrorism SUB Hamburg A/596060 The Geography of International terrorism An Introduction to Spaces and Places of Violent Non-State Groups Richard M. Medina and George F. Hepner CRC Press Taylor & Francis Croup Boca

More information

BOSSIER PARISH DISTRICT COURT DOCKET - October 13, 2015

BOSSIER PARISH DISTRICT COURT DOCKET - October 13, 2015 ADAMS, GORDON LAMAR 213450 Operating A Vehicle While Intoxicated - Third Offense Montgomery, Dale Cox Jeff 213451A CT 1 Operating a Vehicle While License Suspended/Revoked/Cancelled 213451A CT 2 Driving

More information

Gregg Gerber. Strategic Engagement, Emerging Markets

Gregg Gerber. Strategic Engagement, Emerging Markets Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the

More information

Big Data R&D Initiative

Big Data R&D Initiative Big Data R&D Initiative Howard Wactlar CISE Directorate National Science Foundation NIST Big Data Meeting June, 2012 Image Credit: Exploratorium. The Landscape: Smart Sensing, Reasoning and Decision Environment

More information

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper

IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and

More information

Training Courses Catalog 2015

Training Courses Catalog 2015 Training Courses Catalog 2015 Office of Homeland Security Tennessee Department of Safety & Homeland Security Homeland Security Training January 2015 Law Enforcement and Public Safety Courses Introduction

More information

Surveillance and Security Systems

Surveillance and Security Systems Surveillance and Security Systems Surveillance & Security Systems Surveillance Company Overview and Security Systems Company Overview Company Overview Ultra Electronics Surveillance and Security Systems

More information

Mitchell D. Kajzer B09 Flanner Hall Notre Dame, IN 46556 mkajzer1@nd.edu

Mitchell D. Kajzer B09 Flanner Hall Notre Dame, IN 46556 mkajzer1@nd.edu Curriculum Vitae Mitchell D. Kajzer B09 Flanner Hall Notre Dame, IN 46556 mkajzer1@nd.edu EDUCATION University of Notre Dame, Notre Dame, IN Graduate Student Cognition, Brain, and Behavior 08/2012 to Present

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

Computer/IT Project LIST. Contact: 9860171201 8796142757

Computer/IT Project LIST. Contact: 9860171201 8796142757 Computer/IT Project LIST Contact: 9860171201 8796142757 1. Detecting E Banking Phishing Websites Using Associative Classification 2. Vehicle Tracking Using Driver Mobile Gps Tracking 3. Sentiment Analysis

More information

First Pacific Islands Capacity Building Workshop on Child Online Protection

First Pacific Islands Capacity Building Workshop on Child Online Protection First Pacific Islands Capacity Building Workshop on Child Online Protection Extracting Intelligence to Turn the Tables on Child Abuse Material Traffickers. Dr Allan Watt Centre for Policing, Intelligence

More information

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.

Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information. Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: gdavid13@sts.ro adibuciu@sts.ro Environment Network/services can be damaged

More information

Development of Academic Attendence Monitoring System Using Fingerprint Identification

Development of Academic Attendence Monitoring System Using Fingerprint Identification 164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication

More information

Horizontal IoT Application Development using Semantic Web Technologies

Horizontal IoT Application Development using Semantic Web Technologies Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges

More information

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights

Vocabulary Builder Activity. netw rks. A. Content Vocabulary. The Bill of Rights A. Content Vocabulary Directions: Fill in the Crossword Puzzle with content vocabulary words from Chapter 4. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 19 20 18 1 A. Content Vocabulary, Cont. Across 5.

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

NSA Surveillance, National Security and Privacy

NSA Surveillance, National Security and Privacy NSA Surveillance, National Security and Privacy Ir Roy Ko Former HKCERT Manager 20 August 2014 HKIE Veneree Club 1 Agenda Background Edward Snowden National Security Agency (NSA) What NSA has done PRISM

More information

Threats. Physical Threats. Digital Threats CIS/CSE 583. By and large, the physical world is a safe place. This is also true for Cyberspace

Threats. Physical Threats. Digital Threats CIS/CSE 583. By and large, the physical world is a safe place. This is also true for Cyberspace Threats CIS/CSE 583 Physical Threats By and large, the physical world is a safe place Very few people are attacked each day Very few businesses are robbed But the nightly news plays up each such event

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Enterprise Capabilities Descriptions

Enterprise Capabilities Descriptions 1 SYSTEMS ENGINEERING & INTEGRATION 6 COMMUNICATIONS SYSTEMS 11 LIFECYCLE SYSTEMS ENGINEERING 12 LIFECYCLE SYSTEMS INTEGRATION 13 MISSION INTEGRATION 14 DISCIPLINES 15 DOMAINS 2 CYBER 21 CYBER STRATEGIC

More information

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare CIO-SP 3 Task Areas Ten task areas constitute the technical scope of this contract: Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare The objective of this task area is

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board

Comprehensive European Security Approaches: EU Security Programmes. Robert HAVAS EOS Chairman of the Board Comprehensive European Security Approaches: EU Security Programmes Robert HAVAS EOS Chairman of the Board INTRODUCTION the EOS Programmes rationale Why implementing EU Security Programmes / ASPIDA approach?

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Big Data a threat or a chance?

Big Data a threat or a chance? Big Data a threat or a chance? Helwig Hauser University of Bergen, Dept. of Informatics Big Data What is Big Data? well, lots of data, right? we come back to this in a moment. certainly, a buzz-word but

More information