Current Search: security (x)
Pages
-
-
Title
-
EFFECTS OF IT GOVERNANCE ON INFORMATION SECURITY.
-
Creator
-
Wu, Yu, Saunders, Carol, University of Central Florida
-
Abstract / Description
-
This dissertation is composed by three essays that explore the relationship between good IT governance and effective information security services. Governance steers and verifies performance of fiduciary duties, through the implementation of proper governance mechanisms. With a focus on information security, this essay presents three categories of governance mechanisms process-based, structural, and relational. When properly instituted, they work together to ensure that IT understands...
Show moreThis dissertation is composed by three essays that explore the relationship between good IT governance and effective information security services. Governance steers and verifies performance of fiduciary duties, through the implementation of proper governance mechanisms. With a focus on information security, this essay presents three categories of governance mechanisms process-based, structural, and relational. When properly instituted, they work together to ensure that IT understands business requirements for information security and strives to fulfill them. An explanation is offered about the efficacy of those mechanisms, based on an agency theory perspective that views IT as an agent for business. The two underlying causes for agency problems are goal incongruence and information asymmetry between the agent and the principal. Governance mechanisms help to reduce both goal incongruence and information asymmetry. Hence, they lead to desired outcomes. A theoretical framework is presented and empirical tested.
Show less
-
Date Issued
-
2007
-
Identifier
-
CFE0001965, ucf:47435
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001965
-
-
Title
-
SECURITY DESIGN THAT ADDRESSES AGENCY CONFLICTS AND INFORMATION ASYMMETRY.
-
Creator
-
Tewari, Manish, Schnitzlein, Charles, University of Central Florida
-
Abstract / Description
-
This study focuses on the role of structured derivative securities to meet diverse corporate financing objectives in the light of agency theory and asymmetric information. The focus is on the nonconvertible callable-puttable fixed-coupon bonds. The primary objective is to discern the marginal role of the put and put-deferred features in addressing the agency issues and asymmetric information. A sample of (159) securities issued over the period (1977-2005) are examined using Merton's (1974...
Show moreThis study focuses on the role of structured derivative securities to meet diverse corporate financing objectives in the light of agency theory and asymmetric information. The focus is on the nonconvertible callable-puttable fixed-coupon bonds. The primary objective is to discern the marginal role of the put and put-deferred features in addressing the agency issues and asymmetric information. A sample of (159) securities issued over the period (1977-2005) are examined using Merton's (1974) structural contingent claims valuation model. The put option as well as the deferred put option incorporated in these securities is found to mitigate the asset substitution issue. It is also found that these contract features provide considerable insurance against the asymmetric information about the firm's downside risk. Specifically, the effects of asset substitution are mitigated because the put option reduces sensitivity of the security's value to the changes in the firm's volatility. Prior to this study, this effect was believed to be driven primarily by the conversion feature in the convertible bonds and the preferred stocks. In addition, the long-term performance of the underlying common stock indicates systematic negative performance for the protracted periods both prior and subsequent to the issuance, yet it is found that this decline in the equity value has only a limited negative impact on the security.
Show less
-
Date Issued
-
2008
-
Identifier
-
CFE0002424, ucf:47756
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002424
-
-
Title
-
Comparative Analysis of the Relationship between State Security and Ethnic Minority Oppression.
-
Creator
-
Lanza, Grayson, Sadri, Houman, Reynolds, Teddy, Mirilovic, Nikola, University of Central Florida
-
Abstract / Description
-
This research investigates the relationship between the state economic outlook, state security apparatus and the presence of ethnic minority oppression within the state's borders. Modern states have developed extensive security apparatuses as they have developed their economies and this research intended to identify the possibility of a connection between the development of these aspects of the state in relation to ethnic minority repression. The research is broken up into a research design...
Show moreThis research investigates the relationship between the state economic outlook, state security apparatus and the presence of ethnic minority oppression within the state's borders. Modern states have developed extensive security apparatuses as they have developed their economies and this research intended to identify the possibility of a connection between the development of these aspects of the state in relation to ethnic minority repression. The research is broken up into a research design and introductory section, a case study section, and a final analysis and conclusion section. Each of the four case studies studied a and ethnic minority relationship, and in total there were three states and four ethnic minorities researched.The research analyzed four studies and studied relationships between the economic outlook of the state, its security outlook, cultural issues, and how these relate to ethnic minority oppression. The findings of the study indicate some degree of relationship between all the aforementioned variables. The study suggests that the relationship between the state security apparatus and ethnic minority oppression is second to that of a state's economic outlook and ethnic minority oppression and that the security outlook of a state is not an alternative explanation for state repression.Future research questions recommended suggestions are predicated off the results of this research that showed the primacy of state economic outlook. It is recommended for further research into the spatial relationship between ethnic minorities and the productive forces of states, if and how colonial theories can be applied to states that are not settler-colonial in their foundation in relation to ethnic minorities, and how state security apparatuses have developed and how they interact with ethnic minorities.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007483, ucf:52670
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007483
-
-
Title
-
An analysis of the preparedness of educational institutions to ensure the security of their institutional information.
-
Creator
-
Ahmed, Vikram, Johnson, Jerry, Murray, Kenneth, Baldwin, Lee, Amiri, Shahram, University of Central Florida
-
Abstract / Description
-
The purpose of this exploratory study was to analyze and examine the differences in the preparedness of educational institutions toward ensuring the security of their data by comparing their self-reported perceptions of security risks and their assessments of the corresponding risk-mitigating practices. Factors that were studied with reference to securing institutional data were aligned with the five components of information systems: hardware, software, data, procedures and people. The study...
Show moreThe purpose of this exploratory study was to analyze and examine the differences in the preparedness of educational institutions toward ensuring the security of their data by comparing their self-reported perceptions of security risks and their assessments of the corresponding risk-mitigating practices. Factors that were studied with reference to securing institutional data were aligned with the five components of information systems: hardware, software, data, procedures and people. The study examined the perceptions of security threats associated with these factors and explored the perceptions of the effectiveness of critical measures with respect to these factors within the constraints applicable to educational institutions. Given the dynamic nature of the threats to information security, this study further explored mechanisms and frequencies with which the different types of educational institutions conduct key security practices and stay up-to-date in their information security policies and procedures. The population of interest for this study consisted of a cross-sectional representation of the following types of educational institutions in the state of Florida: public and private PK-12 institutions, public and private universities, and virtual schools. At every stage of this exploratory study, comparative analyses were conducted. The researcher found no statistically significant differences between the types of educational institutions in their perceptions of security risks. However, in terms of their perceptions of the effectiveness of security measures, frequencies of key security practices and policy updates, budget allocations, and overall assessment of security preparedness, the educational institutions showed statistically significant differences.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFE0007145, ucf:52293
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007145
-
-
Title
-
FINDING DUD VERTICES IN DEFENSIVE ALLIANCES AND SECURE SETS USING COMPUTATIONAL TOOLS.
-
Creator
-
Worley, George, Zhao, Yue, University of Central Florida
-
Abstract / Description
-
Defensive alliances are a way of using graphs to model the defense of resources (people, buildings, countries, etc.) against attacks where the number of potential attackers against each resource is known. The initial study of defensive alliances focused on questions of minimal defensive alliances in a graph and the minimum possible size of a defensive alliance in a graph, but in order to apply defensive alliances in modeling real-world situations, additional considerations are important. In...
Show moreDefensive alliances are a way of using graphs to model the defense of resources (people, buildings, countries, etc.) against attacks where the number of potential attackers against each resource is known. The initial study of defensive alliances focused on questions of minimal defensive alliances in a graph and the minimum possible size of a defensive alliance in a graph, but in order to apply defensive alliances in modeling real-world situations, additional considerations are important. In particular, since each vertex in a defensive alliance represents some real-world object that has a cost associated with remaining in the defensive alliance, it is important to consider the value each vertex adds to the defensive alliance. In this thesis we consider a method of assessing the efficiency of a defensive alliance, including the special case of secure sets.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0004010, ucf:49166
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004010
-
-
Title
-
THE NEXT GENERATION BOTNET ATTACKS AND DEFENSES.
-
Creator
-
Wang, Ping, Zou, Cliff, University of Central Florida
-
Abstract / Description
-
A "botnet" is a network of compromised computers (bots) that are controlled by an attacker (botmasters). Botnets are one of the most serious threats to today's Internet; they are the root cause of many current Internet attacks, such as email spam, distributed denial of service (DDoS) attacks, click fraud, etc. There have been many researches on how to detect, monitor, and defend against botnets that have appeared and their attack techniques. However, it is equally important for us to...
Show moreA "botnet" is a network of compromised computers (bots) that are controlled by an attacker (botmasters). Botnets are one of the most serious threats to today's Internet; they are the root cause of many current Internet attacks, such as email spam, distributed denial of service (DDoS) attacks, click fraud, etc. There have been many researches on how to detect, monitor, and defend against botnets that have appeared and their attack techniques. However, it is equally important for us to investigate possible attack techniques that could be used by the next generation botnets, and develop effective defense techniques accordingly in order to be well prepared for future botnet attacks. In this dissertation, we focus on two areas of the next generation botnet attacks and defenses: the peer-to-peer (P2P) structured botnets and the possible honeypot detection techniques used by future botnets. Currently, most botnets have centralized command and control (C&C) architecture. However, P2P structured botnets have gradually emerged as a new advanced form of botnets. Without C&C servers, P2P botnets are more resilient to defense countermeasures than traditional centralized botnets. Therefore, we first systematically study P2P botnets along multiple dimensions: bot candidate selection, network construction and C&C mechanisms and communication protocols. As a further illustration of P2P botnets, we then present the design of an advanced hybrid P2P botnet, which could be developed by botmasters in the near future. Compared with current botnets, the proposed botnet is harder to be shut down, monitored, and hijacked. It provides robust network connectivity, individualized encryption and control traffic dispersion, limited botnet exposure by each bot, and easy monitoring and recovery by its botmaster. We suggest and analyze several possible defenses against this advanced botnet. Upon our understanding of P2P botnets, we turn our focus to P2P botnet countermeasures. We provide mathematical analysis of two P2P botnet mitigation approaches --- index poisoning defense and Sybil defense, and one monitoring technique - passive monitoring. We are able to give analytical results to evaluate their performance. And simulation-based experiments show that our analysis is accurate. Besides P2P botnets, we investigate honeypot-aware botnets as well. This is because honeypot techniques have been widely used in botnet defense systems, botmasters will have to find ways to detect honeypots in order to protect and secure their botnets. We point out a general honeypot-aware principle, that is security professionals deploying honeypots have liability constraint such that they cannot allow their honeypots to participate in real attacks that could cause damage to others, while attackers do not need to follow this constraint. Based on this principle, a hardware- and software- independent honeypot detection methodology is proposed. We present possible honeypot detection techniques that can be used in both centralized botnets and P2P botnets. Our experiments show that current standard honeypot and honeynet programs are vulnerable to the proposed honeypot detection techniques. In the meantime, we discuss some guidelines for defending against general honeypot-aware botnet attacks.
Show less
-
Date Issued
-
2010
-
Identifier
-
CFE0003443, ucf:48428
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003443
-
-
Title
-
ON THE APPLICATION OF LOCALITY TO NETWORK INTRUSION DETECTION: WORKING-SET ANALYSIS OF REAL AND SYNTHETIC NETWORK SERVER TRAFFIC.
-
Creator
-
Lee, Robert, Lang, Sheau-Dong, University of Central Florida
-
Abstract / Description
-
Keeping computer networks safe from attack requires ever-increasing vigilance. Our work on applying locality to network intrusion detection is presented in this dissertation. Network servers that allow connections from both the internal network and the Internet are vulnerable to attack from all sides. Analysis of the behavior of incoming connections for properties of locality can be used to create a normal profile for such network servers. Intrusions can then be detected due to their abnormal...
Show moreKeeping computer networks safe from attack requires ever-increasing vigilance. Our work on applying locality to network intrusion detection is presented in this dissertation. Network servers that allow connections from both the internal network and the Internet are vulnerable to attack from all sides. Analysis of the behavior of incoming connections for properties of locality can be used to create a normal profile for such network servers. Intrusions can then be detected due to their abnormal behavior. Data was collected from a typical network server both under normal conditions and under specific attacks. Experiments show that connections to the server do in fact exhibit locality, and attacks on the server can be detected through their violation of locality. Key to the detection of locality is a data structure called a working-set, which is a kind of cache of certain data related to network connections. Under real network conditions, we have demonstrated that the working-set behaves in a manner consistent with locality. Determining the reasons for this behavior is our next goal. A model that generates synthetic traffic based on actual network traffic allows us to study basic traffic characteristics. Simulation of working-set processing of the synthetic traffic shows that it behaves much like actual traffic. Attacks inserted into a replay of the synthetic traffic produce working-set responses similar to those produced in actual traffic. In the future, our model can be used to further the development of intrusion detection strategies.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002718, ucf:48171
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002718
-
-
Title
-
HUNGRY AND TAKING THE BUS? ASSESSING FOOD OUTLET ACCESSIBILITY IN CENTRAL FLORIDA.
-
Creator
-
Smith, Katelan, Wright, James, University of Central Florida
-
Abstract / Description
-
Little academic research has been conducted examining access to transportation by those in need. The small amount of research that has been done focuses primarily on mobility issues of the elderly and the disabled, despite findings that income level is an important determinant in access to transportation. The few studies that have examined access to transportation in relation to income simply cite the difficulties that those in poverty face when attempting to access vital resources as...
Show moreLittle academic research has been conducted examining access to transportation by those in need. The small amount of research that has been done focuses primarily on mobility issues of the elderly and the disabled, despite findings that income level is an important determinant in access to transportation. The few studies that have examined access to transportation in relation to income simply cite the difficulties that those in poverty face when attempting to access vital resources as problematic, yet very few focus specifically on this issue. This thesis examines how free food recipients commute to and from local pantries, and whether public transportation in the Orlando metropolitan area adequately services food bank resources utilized by low income individuals. Physical location data as well as survey questionnaires were used to determine commuting patterns as well as the overall availability and utilization of transit options of Orlando's low income population. Findings from this study show that even though nearly 50% of respondents do not own a car, public transportation remains a last option, making the Orlando area heavily dependent on cars, even for those with no direct access to one. Despite low public transit ridership, it was found that the majority of food pantries in Orange County are adequately serviced by LYNX, while pantries in Seminole County suffer from a severe lack of services.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0003913, ucf:48757
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003913
-
-
Title
-
Determinants of Terrorist Target Selection: A Quantitative Analysis.
-
Creator
-
Haywood, Taylor, Handberg, Roger, Dolan, Thomas, Boutton, Andrew, Vasquez, Joseph, University of Central Florida
-
Abstract / Description
-
Existing research on the subject of terrorism is vast, spanning causes of terrorism, the membership of terrorist groups, types of terrorist attacks, and more. One area of terrorism research, though, has received only limited consideration: terrorist target selection. What research does exist explains target selection almost exclusively as a function of ideology (Asal et al. 2009, 270 and 274; Drake 1998b, 54-56 and 58). However, such a limited causal focus obscures other possible, and...
Show moreExisting research on the subject of terrorism is vast, spanning causes of terrorism, the membership of terrorist groups, types of terrorist attacks, and more. One area of terrorism research, though, has received only limited consideration: terrorist target selection. What research does exist explains target selection almost exclusively as a function of ideology (Asal et al. 2009, 270 and 274; Drake 1998b, 54-56 and 58). However, such a limited causal focus obscures other possible, and probable, explanations of terrorist target selection. This paper proposes an alternative explanation of terrorist target selection that includes ideological and terrorist group capability variables, as well as a variable measuring the security levels in the geographic areas in which terrorist attacks take place. A research design employing multiple ordinary least squares regression is utilized. The findings demonstrate the importance of the independent variables, as well as the significance of the effects of the two-way and three-way interactions of variables from the three categories. Furthermore, the multiple regression models explain a greater percentage of the effects of the independent variables on the percentage of attacks against civilian targets when the three-way interaction variable is included than when this interaction variable is not included. From these findings, two primary policy implications are derived.
Show less
-
Date Issued
-
2017
-
Identifier
-
CFE0006744, ucf:51853
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006744
-
-
Title
-
GLOBAL SECURE SETS OF TREES AND GRID-LIKE GRAPHS.
-
Creator
-
Ho, Yiuyu, Dutton, Ronald, University of Central Florida
-
Abstract / Description
-
Let G = (V, E) be a graph and let S be a subset of vertices. The set S is a defensive alliance if for all x in S, |N intersect S| >= |N - S|. The concept of defensive alliances was introduced in , primarily for the modeling of nations in times of war, where allied nations are in mutual agreement to join forces if anyone of them is attacked. For a vertex x in a defensive alliance, the number of neighbors of x inside the alliance, plus the vertex x, is at least the number of neighbors of x...
Show moreLet G = (V, E) be a graph and let S be a subset of vertices. The set S is a defensive alliance if for all x in S, |N intersect S| >= |N - S|. The concept of defensive alliances was introduced in , primarily for the modeling of nations in times of war, where allied nations are in mutual agreement to join forces if anyone of them is attacked. For a vertex x in a defensive alliance, the number of neighbors of x inside the alliance, plus the vertex x, is at least the number of neighbors of x outside the alliance. In a graph model, the vertices of a graph represent nations and the edges represent country boundaries. Thus, if the nation corresponding to a vertex x is attacked by its neighbors outside the alliance, the attack can be thwarted by x with the assistance of its neighbors in the alliance. In a different subject matter, applies graph theory to model the world wide web, where vertices represent websites and edges represent links between websites. A web community is a subset of vertices of the web graph, such that every vertex in the community has at least as many neighbors in the set as it has outside. So, a web community C satisfies for all x in C, |N intersect C| > |N - C|. These sets are very similar to defensive alliances. They are known as strong defensive alliances in the literature of alliances in graphs. Other areas of application for alliances and related topics include classification, data clustering, ecology, business and social networks. Consider the application of modeling nations in times of war introduced in the first paragraph. In a defensive alliance, any attack on a single member of the alliance can be successfully defended. However, as will be demonstrated in Chapter 1, a defensive alliance may not be able to properly defend itself when multiple members are under attack at the same time. The concept of secure sets is introduced in for exactly this purpose. The set S is a secure set if every subset X of S, with the assistance of vertices in S, can successfully defend against simultaneous attacks coming from vertices outside of S. The exact definition of simultaneous attacks and how such attacks may be defended will be provided in Chapter 1. In , the authors presented an interesting characterization for secure sets which resembles the definition of defensive alliances. A non-empty set S is a secure set if and only if for all subset X of S, |N intersect S| >= |N - S| (, Theorem 11). The cardinality of a minimum secure set is the security number of G, denoted s(G). A secure set S is a global secure set if it further satisfies N = V. The cardinality of a minimum global secure set of G is the global security number of G, denoted gs(G). In this work, we present results on secure sets and global secure sets. In particular, we present algorithms and bounds for the global security numbers of trees, and the exact values of the global security numbers of paths, cycles and their Cartesian products. Petter Kristiansen, Sandra M. Hedetniemi, and Stephen T. Hedetniemi. "Alliances in graphs." J. Combin. Math. Combin. Comput., 48:157-177, 2004. G. W. Flake, S. Lawrence, and C. L. Giles. "Efficient identification of web communities." ACM SIGKDD, pp. 150-160, 2000. Robert C. Brigham, Ronald D. Dutton, and Stephen T. Hedetniemi. "Security in graphs." Discrete Appl. Math., 155(13):1708-1714, 2007.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0003888, ucf:48719
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003888
-
-
Title
-
Red tape and barbed wire: Close-up of the McCarran Law in action.
-
Creator
-
Garlin, Sender
-
Date Issued
-
1952
-
Identifier
-
1927030, CFDT1927030, ucf:4794
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/FCLA/DT/1927030
-
-
Title
-
Wall Street.
-
Creator
-
Rochester, Anna
-
Date Issued
-
1932
-
Identifier
-
369431, CFDT369431, ucf:5454
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/FCLA/DT/369431
-
-
Title
-
DEVELOPING STRAND SPACE BASED MODELS AND PROVING THE CORRECTNESS OF THE IEEE 802.11I AUTHENTICATION PROTOCOL WITH RESTRICTED SECURITY OBJECTIVES.
-
Creator
-
Furqan, Zeeshan, Guha, Ratan, University of Central Florida
-
Abstract / Description
-
The security objectives enforce the security policy, which defines what is to be protected in a network environment. The violation of these security objectives induces security threats. We introduce an explicit notion of security objectives for a security protocol. This notion should precede the formal verification process. In the absence of such a notion, the security protocol may be proven correct despite the fact that it is not equipped to defend against all potential threats. In order to...
Show moreThe security objectives enforce the security policy, which defines what is to be protected in a network environment. The violation of these security objectives induces security threats. We introduce an explicit notion of security objectives for a security protocol. This notion should precede the formal verification process. In the absence of such a notion, the security protocol may be proven correct despite the fact that it is not equipped to defend against all potential threats. In order to establish the correctness of security objectives, we present a formal model that provides basis for the formal verification of security protocols. We also develop the modal logic, proof based, and multi-agent approaches using the Strand Space framework. In our modal logic approach, we present the logical constructs to model a protocol's behavior in such a way that the participants can verify different security parameters by looking at their own run of the protocol. In our proof based model, we present a generic set of proofs to establish the correctness of a security protocol. We model the 802.11i protocol into our proof based system and then perform the formal verification of the authentication property. The intruder in our model is imbued with powerful capabilities and repercussions to possible attacks are evaluated. Our analysis proves that the authentication of 802.11i is not compromised in the presented model. We further demonstrate how changes in our model will yield a successful man-in-the-middle attack. Our multi-agent approach includes an explicit notion of multi-agent, which was missing in the Strand Space framework. The limitation of Strand Space framework is the assumption that all the information available to a principal is either supplied initially or is contained in messages received by that principal. However, other important information may also be available to a principal in a security setting, such as a principal may combine information from different roles played by him in a protocol to launch a powerful attack. Our presented approach models the behavior of a distributed system as a multi-agent system. The presented model captures the combined information, the formal model of knowledge, and the belief of agents over time. After building this formal model, we present a formal proof of authentication of the 4-way handshake of the 802.11i protocol.
Show less
-
Date Issued
-
2007
-
Identifier
-
CFE0001801, ucf:47380
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001801
-
-
Title
-
COLLABORATION ENFORCEMENT IN MOBILE AD HOC NETWORKS.
-
Creator
-
Jiang, Ning, Hua, Kien, University of Central Florida
-
Abstract / Description
-
Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of...
Show moreMobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving node detection is performed on-demand; and malicious node punishment and avoidance are accomplished by only maintaining reputation information within neighboring nodes. This scheme, however, requires that each node equip with a tamper-proof hardware. In the second technique, no such restriction applies. Participating nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. In both schemes, overall network performance is greatly enhanced. Our approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost.
Show less
-
Date Issued
-
2006
-
Identifier
-
CFE0001047, ucf:46820
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0001047
-
-
Title
-
TO CATCH A TERRORIST: THE IMPROPER USE OF PROFILING IN U.S. POST-9/11 COUNTERTERRORISM.
-
Creator
-
Crawford, Kamillia, Ravich, Timothy M., University of Central Florida
-
Abstract / Description
-
The attacks of September 11, 2001 (9/11) caused thousands of deaths, national and global panic, and immediate action by the federal government to protect the borders of the United States of America (USA) from terrorism. In response to these attacks, the United States (U.S.) government enacted laws for law enforcement agencies to protect against terrorist activities. Law enforcement agencies are effective in combating terrorism, but their measures contain a major flaw - the improper use of...
Show moreThe attacks of September 11, 2001 (9/11) caused thousands of deaths, national and global panic, and immediate action by the federal government to protect the borders of the United States of America (USA) from terrorism. In response to these attacks, the United States (U.S.) government enacted laws for law enforcement agencies to protect against terrorist activities. Law enforcement agencies are effective in combating terrorism, but their measures contain a major flaw - the improper use of race in profiling to address national security and public safety concerns. Racial profiling is an ineffective measure for preventing terrorism. There are solutions to correct this flaw through reconstructing training and implementing policies for all law enforcement agencies. The intent of this thesis is to discuss the history and the effectiveness of profiling in U.S. post-9/11 counterterrorism through theoretical research of peer-reviewed journals and articles, relevant laws, and United States Supreme Court cases to offer solutions to the problems racial profiling presents. The discussion will generate a search for new ways law enforcement agencies could conduct daily counterterrorism operations.
Show less
-
Date Issued
-
2016
-
Identifier
-
CFH2000057, ucf:45534
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH2000057
-
-
Title
-
THE EFFECTS OF SUICIDE TERRORISM IN AFGHANISTAN AND IRAQ ON US POLICY AND MILITARY STRATEGY.
-
Creator
-
Whalen, Michelle, Sadri, Houman, University of Central Florida
-
Abstract / Description
-
The international political landscape of the 21st century is strewn with terrorist groups that choose to act violently in order for their political messages to be heard. Around the world groups have been formed to defend their ideologies and fulfill their political agendas through acts of terrorism. The Baader-Meinhof Gang [also known as the Red Army Faction], the Weather Underground, the Liberation Tigers of Tamil Eelam, Hezbollah, the Revolutionary Armed Forces of Colombia, HAMAS, and the...
Show moreThe international political landscape of the 21st century is strewn with terrorist groups that choose to act violently in order for their political messages to be heard. Around the world groups have been formed to defend their ideologies and fulfill their political agendas through acts of terrorism. The Baader-Meinhof Gang [also known as the Red Army Faction], the Weather Underground, the Liberation Tigers of Tamil Eelam, Hezbollah, the Revolutionary Armed Forces of Colombia, HAMAS, and the Irish Republican Army have existed for many decades. They represent only a small handful of terrorist groups that have kidnapped, targeted public institutions with bombs, and employed suicide terrorism. More often than not innocent civilians become involved in the carnage of an act of terrorism when they are caught off guard as unassuming bystanders. On September 11th, 2001 both the American public and US government officials bore the weight of that horrific day. Since 9-11, Americans were robbed of their sense of safety, and the American dream of tranquility was shattered. A general unease spread from the wreckage of the World Trade Centers, and with the passing of time a keen sense of awareness about terrorism took its place. The events of 9/11 have made US citizens fully cognizant that there are many actors actively plotting the destruction of the US. Now, eight years later, Americans live with the daily realization that such a heinous act could happen again, in some other unimaginable form. For the US government, the past eight years have been marked with as many successes as failures. The consequences of the inability of the US intelligence community to foresee the international plot unfolding, within and outside of the homeland, resulted in a major reorganization within the US government. The US Department of Homeland Security (DHS) was established on November 25, 2002, and was created solely to address US vulnerabilities highlighted by the actions of nineteen al-Qaeda suicide terrorists. The DHS' main responsibility is to improve communication and information sharing among various intelligence-gathering agencies, so another attempt to plan an attack like 9/11 on US soil would be foiled before it materialized. The US government would no longer be noncommittal in the face of terrorism, as it had before 9/11. Clear messages to terrorists were sent on October 7th, 2001, through the US invasion of Afghanistan, and subsequently on March 20th, 2003 through the US invasion of Iraq. Thus, the US' stance on the War on Terrorism was effectively and clearly communicated to al-Qaeda and throughout the rest of the world. The US might once have been labeled a paper tiger, but hitting the US at the core of their financial and military symbols struck a nerve. The terrorist attacks of 2001 taught the US government a vital lesson, but the military campaigns of Afghanistan and Iraq would demonstrate that the US had even more to learn about the newest military tactics and techniques employed by the enemy, and how these tactics impacted on US military operations, strategies, and policies.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002921, ucf:47996
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002921
-
-
Title
-
Miami-Dade Task Force: A Content Analysis of How Coastal Communities View Sea Level Rise as a Threat.
-
Creator
-
Alvaro, Francisco, Jacques, Peter, Knox, Claire, Hinkle, Ross, University of Central Florida
-
Abstract / Description
-
Sea level rise (SLR) has become a serious threat for coastal communities in recent years. Many communities, including South Florida, are already having the security of their daily lives impacted as climate change causes SLR and other environmental impacts to worsen. This study reviews the Miami-Dade Sea Level Rise Task Force Report to determine how this coastal county government views SLR as a threat. Using mixed content analysis to analyze the report qualitatively and quantitatively, the...
Show moreSea level rise (SLR) has become a serious threat for coastal communities in recent years. Many communities, including South Florida, are already having the security of their daily lives impacted as climate change causes SLR and other environmental impacts to worsen. This study reviews the Miami-Dade Sea Level Rise Task Force Report to determine how this coastal county government views SLR as a threat. Using mixed content analysis to analyze the report qualitatively and quantitatively, the Task Force's recommendations are categorized based on their focus on security, infrastructure, economics, and the environment. One finds the concerns of the people to maintain their property and infrastructure, as well as their access to water and other basic needs, as insurance costs spike and funding becomes more difficult to obtain. Policies will have to be revised using updated scientific studies, modeling, and mapping to mitigate against the worse-case scenarios.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007427, ucf:52705
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007427
-
-
Title
-
TESTING THE IMPACT OF TRAINING WITH SIMULATED SCENARIOS FOR INFORMATION SECURITY AWARENESS ON VIRTUAL COMMUNITY OF PRACTICE MEMBERS.
-
Creator
-
Tidwell, Craig, Reilly, Charles, University of Central Florida
-
Abstract / Description
-
Information security has become a major challenge for all private and public organizations. The protection of proprietary and secret data and the proper awareness of what is entailed in protecting this data are necessary in all organizations. This treatise examines how simulation and training would influence information security awareness over time in virtual communities of practice under a variety of security threats. The hypothesis of the study was that security-trained members of a virtual...
Show moreInformation security has become a major challenge for all private and public organizations. The protection of proprietary and secret data and the proper awareness of what is entailed in protecting this data are necessary in all organizations. This treatise examines how simulation and training would influence information security awareness over time in virtual communities of practice under a variety of security threats. The hypothesis of the study was that security-trained members of a virtual community of practice would respond significantly better to routine security processes and attempts to breach security or to violate the security policy of their organization or of their virtual community of practice. Deterrence theory was used as the grounded theory and integrated in the information security awareness training with simulated scenarios. The study provided training with simulated scenarios and then tested the users of a virtual community of practice over an approximately twelve-week period to see if the planned security awareness training with simulated security problem scenarios would be effective in improving their responses to the follow-up tests. The research subjects were divided into four groups, the experimental group and three control groups. The experimental group received all of the training and testing events throughout the twelve-week period. The three control groups received various portions of the training and testing. The data from all of the tests were analyzed using the Kruskal-Wallis ranked order test, and it was determined that there was no significant difference between the groups at the end of the data collection. Even though the null hypothesis, which stated that there would be no difference between the groups scores on the information security awareness tests, was not rejected, the groups that received the initial training with the simulated scenarios did perform slightly better from the pre-training test to the post-training test when compared with the control group that did not receive the initial training. More research is suggested to determine how information security awareness training with simulated scenarios and follow-up testing can be used to improve and sustain the security practices of members of virtual communities of practice. Specifically, additional research could include: comparing the effect of training with the simulated scenarios and with training that would not use the simulated security scenarios; the potential benefits of using adaptive and intelligent training to focus on the individual subjects' weaknesses and strengths; the length of the training with simulated scenarios events, the time between each training event, and the overall length of the training; the demographics of the groups used in the training, and how different user characteristics impact the efficacy of the training with simulated scenarios and testing; and lastly examining how increasing the fidelity of the simulated scenarios might impact the results of the follow-up tests.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0003566, ucf:48923
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003566
-
-
Title
-
A Wolf in Military Clothing: A Case Study Examination of Lone Wolf Terrorism and the Roles and Responsibilities of Government Agencies.
-
Creator
-
Bandel, Peter, Sadri, Houman, Houghton, David, Kapucu, Naim, University of Central Florida
-
Abstract / Description
-
Since the fall of September, 2011, there has been a major increase in awareness and study of global terrorism. Academia, the media, politicians, and the average citizen all have varying definitions, ideas, and concerns about terrorism. The focus has mainly been on international terrorism. Terrorist organizations like Al Qaeda have permeated the discussion. However, there is a growing concern of the (")lone wolf terrorist.(") A lone wolf terrorist acts without a terrorist organization and is...
Show moreSince the fall of September, 2011, there has been a major increase in awareness and study of global terrorism. Academia, the media, politicians, and the average citizen all have varying definitions, ideas, and concerns about terrorism. The focus has mainly been on international terrorism. Terrorist organizations like Al Qaeda have permeated the discussion. However, there is a growing concern of the (")lone wolf terrorist.(") A lone wolf terrorist acts without a terrorist organization and is capable of having his/her own radical agenda with the audacity and simplicity to carry it out solely and enact great damage. The focus in the United States and globally has been on international lone wolf terrorists. This is important, but a longstanding concern (that often goes without much conversation) is the domestic lone wolf terrorist. Using Gustav Freytag's Triangle and Rational Choice theory, it is shown that lone wolf terrorism must be examined by the United States government to ensure safety of its citizens. A lone wolf terrorist is characterized as a United States citizen who enacts a terrorist action without being part of an organization or terror group. His motives are extremist in nature. This thesis examines the growing phenomena of the domestic lone wolf terrorist. In doing so, the primary function is to look at an even starker reality: that some lone wolf terrorists have served in the military, and during service have shown to portray radical thoughts and actions. Furthermore, these lone wolf terrorists used their military training and weapon insight to enact their catastrophic aims. This thesis uses a case study methodology to examine three lone wolf actors. From the Oklahoma City Bombing, to the 1996 Olympic Summer Games in Atlanta and on to the Ft. Hood shootings the studies find that in all cases the actors did have radical beliefs, military training and used that training in concert with their attacks. This thesis can be used as a discussion about lone wolf terrorism, but also about governance. The findings show an increased need for the Department of Defense to work closely with the Department of Homeland Security and seek greater advice from organizations like the Federal Bureau of Investigation in order to conduct better psychological studies and examinations of military personnel. A disclaimer must be made that this thesis does not, in any way, seek to disparage the amazing amount of work and sacrifice of United States government personnel and agencies. This thesis aims to provide research towards improved understanding and combating of lone wolf terrorism.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004507, ucf:49266
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004507
-
-
Title
-
Predictors of Food Insecurity in 3 Central Florida Communities.
-
Creator
-
Towns, Tangela, Rivera, Fernando, Carter, Shannon, Wright, James, Dunn, Stacey, University of Central Florida
-
Abstract / Description
-
This study examined the association between different socio-demographic factors and food insecurity in the Central Florida Communities of Maitland, Winter Park, and Eatonville. Data from the Institute for Social and Behavioral Sciences at the University of Central Florida were utilized to analyze 3 main questions: In which community is food insecurity more prevalent? To what extent are food consumption, transportation, poverty, and unemployment associated with food insecurity? Does the...
Show moreThis study examined the association between different socio-demographic factors and food insecurity in the Central Florida Communities of Maitland, Winter Park, and Eatonville. Data from the Institute for Social and Behavioral Sciences at the University of Central Florida were utilized to analyze 3 main questions: In which community is food insecurity more prevalent? To what extent are food consumption, transportation, poverty, and unemployment associated with food insecurity? Does the association between food consumption, transportation, poverty, unemployment, and food insecurity remain when controlling for self-reported overall health, education, marital status, and race. The results revealed differences in predictors of food insecurities. Particularly, there was a positive relationship between food consumption and the knowledge of recommended number of servings of fruits and vegetables suggesting that those who have nutritional knowledge practice healthy dietary behaviors. Furthermore, structural dysfunctions and affordability pose food consumption limitations on the communities studied (mainly Eatonville).
Show less
-
Date Issued
-
2013
-
Identifier
-
CFE0004947, ucf:49564
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004947
Pages