The Internet of Things (IoT) refers to “smart” electronic sensors and chips that are embedded in devices, apps and in the physical things and spaces around us. They are designed to “talk” to one another via data transfer.
After serving in the Marine Corps, Michael Woods went on to pursue his interests by obtaining a degree through AMU in the field of Information Systems Security.
Artificial intelligence has its roots in both myth and science. In the 20th century, artificial intelligence started its transformation from ancient myth and legend to man-made reality.
What privacy rights do you have if your laptop is seized at a United States border crossing? The case United States v. Cotterman revolves around this issue. Of interest here is how advances in cybersecurity and computer forensics are changing how the Fourth Amendment is applied.
In a previous article, AMU graduate student Mark Colwell and I discussed our exploration of how tribes in Alaska use information technology (IT). Through a research grant from APUS, we had the opportunity to examine the dynamics of IT among tribes in Alaska and Arizona.
DEFCON began in 1992, when Platinum Net, a Fido protocol-based hacking network, held a party in Las Vegas for members of Bulletin Board Systems (BBS) and their users. The party was organized by Jeff Moss, an American hacker, computer and Internet security expert.
People keep coming back to DEFCON because of the unique quality of the conference presentations. They are often on topics that most organizations would not want to publicize: computer hacking, robots hacking safes, implanting passwords and cognitive memory.
Consider the increasingly common ransomware attacks, such as the cyber attack on the Erie County Medical Center’s computers. Its 6,000 computers were disabled and a ransom demand for nearly $6,000 appeared on the screens of the affected computers to unlock their data. The Buffalo, New York, medical center refused to pay and suffered nearly $10 million in expenses.
In addition to learning more about information security, the BSidesLV Information Security Conference in Las Vegas is a target-rich environment for gaining information about jobs. In some cases, you might even have the chance to interview with potential employers as well.