Advanced search Help
Searching for terms: EXACT: "Jabbour, Kamal" in: author
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
Sixth Workshop on Education in Computer Security (WECS6): Avoiding Fear, Uncertainty and Doubt Through Effective Security Education
"Naturally, information security educators play an important role in addressing the problems of fear, uncertainty and doubt. We can provide our students with an understanding of system vulnerabilities, the threat agents to whom such vulnerabilities would be attractive, and techniques for mitigating those threats. Even more importantly, our students can be practiced in the critical thinking skills necessary to discern cyber security snake oil and voodoo from sound security architectures and products. It is within this context that we welcome you to the Sixth Workshop on Education in Computer Security (WECS). Our theme this year is 'Avoiding Fear, Uncertainty, and Doubt through Effective Security Education.' The papers contained in this volume present tools and techniques that have been used in undergraduate and graduate settings. Some of the papers describe entire programs or courses, while others present laboratory activities; a few papers explore rather unusual techniques for conveying the cyber security message. The scope of our field continues to expand and this year's workshop includes papers that will broaden our horizons and enrich our teaching. We hope that the readers of this volume will join the conference organizers, authors and participants for future workshops and conferences on information security education."
Naval Postgraduate School (U.S.)
Murray, William Hugh; Tikekar, Rahul V.; Levin, Timothy E. . . .
2004-07
-
Cyber Vision and Cyber Force Development
"Rapid technology advances over the past three decades and the proliferation of computers into weapon systems created a dichotomy of net-centric military superiority and a commensurate reliance on vulnerable technology. The simultaneous depletion of the US computer industrial base and its migration overseas reduced further the cost of net-centricity and increased disproportionately military dependence on foreign technology. Budgetary pressures compounded the slide away from assured government off-the-shelf (GOTS) stand-alone weapons towards affordable commercial off-the-shelf (COTS) networked systems. Given this climate of rapid technological advance and global political change, the USAF recognizes the duality of cyberspace as a war-fighting domain as well as a foundational domain. As a war-fighting domain, cyberspace affords irregular adversaries a low-cost option to attack our global interests. As a foundational domain, cyberspace offers our peers an attack vector to negate our superiority in the traditional domains of land, sea, air, and space. By adding cyberspace to its mission statement and standing up a cyberspace command, the USAF took on the challenge to develop and present forces ready to fight in this domain. This recognition of cyber warfare as a revolution in military affairs (RMA) raises fundamental questions on concepts, organization, and technology. Amidst these questions lies the challenge of presenting cyber options to the National Command Authority (NCA) and cyber-ready forces to the combatant commanders."
Air University (U.S.). Press
Jabbour, Kamal
2010
1