archive-edu.com » EDU » A » AUBURN.EDU

Total: 14

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Information Assurance Center
    Assurance Education and Research What is IA Information operations that protect and defend information and information systems by ensuring their availability integrity authentication confidentiality and nonrepudiation This includes providing for restoration of information systems by incorporating protection detection and reaction

    Original URL path: http://ia.auburn.edu/ (2013-03-22)
    Open archived version from archive


  • Information Assurance Center - IA Laboratory
    and develop new techniques of assuring secure and accurate data transmission and reception Towards that end the IAL plays a key role in supporting the activities of both Auburn s center for Innovations in Mobile Pervasive and Agile Computing Technologies and Information Assurance IMPACT IA and the Samuel L Ginn College of Engineering s wireless curriculum The IAL is the research arm of Auburn s Information Assurance Center IAC and

    Original URL path: http://ia.auburn.edu/ia_lab/index.php (2013-03-22)
    Open archived version from archive

  • Information Assurance Center - Cyber Defense Exercise
    Tuskegee University will participate in an inter collegiate Cyber Defense Exercise CDX Information warfare is the defensive and offensive use of information and information systems to exploit an opponent s information resources The concept of the exercise is to develop

    Original URL path: http://ia.auburn.edu/cyber_defense_exercise/index.php (2013-03-22)
    Open archived version from archive

  • Information Assurance Center - Partnerships
    fashion Government Partners Auburn University is a National Center of Academic Excellence in Information Assurance certified by the National Security Agency NSA and the Department of Homeland Security DHS As a result the Information Assurance Center at Auburn is eligible to partner with government agencies to work on information assurance projects Currently the IAC is working with the Missile Defense Agency MDA on various initiatives Industry Partners As a result

    Original URL path: http://ia.auburn.edu/partnerships/index.php (2013-03-22)
    Open archived version from archive

  • Information Assurance Center - Scholarhips
    Agency NSA on behalf of the Department of Defense DoD Auburn is a National Center of Academic Excellence CAE in Information Assurance Education and therefore its students are eligible to apply for this scholarship opportunity More Information on IASP Applying for IASP at Auburn University National Science Foundation Scholarship For Service SFS Scholarship for Service SFS is a unique program designed to increase and strengthen the cadre of federal information

    Original URL path: http://ia.auburn.edu/scholarships/index.php (2013-03-22)
    Open archived version from archive

  • Information Assurance Center - IA Resources
    intended for information purposes only General Security Links IT Security SANS Hacking Exposed Dark Reading Honeynet Project Security Focus Black Hat US Government IA DISA IASE NIST Computer Security NIST Vulnerability DB DISA STIGS NSA Security Guides CNSS CERT Links

    Original URL path: http://ia.auburn.edu/ia_resources/index.php (2013-03-22)
    Open archived version from archive

  • Information Assurance Center - Cyber Defense Exercise
    Center Dr Richard Chapman Associate Professor Department of Computer Science and Software Engineering Dr Xiao Qin Associate Professor Department of Computer Science and Software Engineering Dr Weishinn Ku Assistant Professor Department of Computer Science and Software Engineering Dr Chwan Hwa John Wu Professor Department of Electrical and Computer Engineering Dr Darrel Hankerson Professor Department of Mathematics Statistics Dr Casey Cegielski Associate Professor Department of Information Systems Management Dr Eric Imsand

    Original URL path: http://ia.auburn.edu/faculty/index.php (2013-03-22)
    Open archived version from archive

  • Information Assurance Center - IA Laboratory - Research Areas
    DDoS attacks and experiments with the means to proactively eliminated DDoS attacks The same vulnerabilities that allow attackers to spawn zombie processes on victim machines can also be used to eliminate those zombies This technique takes advantage of the fact that most zombied computers have been infected by one of two major hacking tools Back Orifice or Sub7 These programs can be freely downloaded by anyone and are often used by ÒScript KiddiesÓ to launch Distributed DDoS attacks Fortunately the reuse of this code allows for the reuse of a solution After being installed on an unaware victimÕs computer the Sub7 zombie connects to an IRC chat room to notify the hacker that a new computer has become victimized A skilled programmer can write applications to monitor these zombie chat rooms to find out which computers are zombies and possibly who is using them Not only will the research provide the ability to monitor the zombies but the user could also notify the victim of the zombie infestation or even remove the zombie completely Ultimately this research project hopes to stop DDoS attacks at the source 3 Secure Wireless Devices Dr Richard Chapman Dr Drew Hamilton Security for Software Defined Radio We are actively looking for ways to safeguard the CORBA Object request Brokers specified in the Software Communications Architecture SCA and the Software Defined Radio documentation The core framework control and status messages are passed back and forth between the read and black side CORBA messages consist of marshaled data embedded in a transport protocol not in a readable structure when not in application space making security checking very difficult A bypass is also available for CORBA message traffic The control status bypass has no specific APIs Platform and waveform specific security policies define the parameters of the control status bypass guard This all points to a problem that is not new to any network communication scheme how to provide a secure fully automated electronic connection between a secure system and a non secure system There are some other significant security threats also Much of the software especially the waveform software is written in C and C Current vulnerabilities of the standard I O and system functions in these languages are well known Pointers are used in the waveform software so type confusion garbage memory dangling references and malicious pointer manipulation can occur Another threat is in the exception handling which may be used to raise and catch security exceptions Exception handling subroutines are not portable between ORB implementations by different vendors Consequently the software security mechanisms will not be uniformly applied among the different implementations This affects the core framework the device drivers and the application services Secure Handheld Devices Wireless handheld computing devices have tremendous potential for further widespread deployment Wireless devices can move with first responders military units or business consumers Wireless security must be considered from both external and internal threats High powered transmitters and receivers located on mobile platforms may be used in attempts

    Original URL path: http://ia.auburn.edu/ia_lab/research_areas.php (2013-03-22)
    Open archived version from archive



  •