Updating search results...

Search Resources

62 Results

View
Selected filters:
  • security
An Implementation of Steganography
Read the Fine Print
Educational Use
Rating
0.0 stars

Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated with this task, brainstorm solutions, select a solution, and implement it. Once their messages are hidden, classmates attempt to decipher them. Based on the outcome of the testing phase, students refine and improve their solutions.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Brian Sandall
Derek Babb
Date Added:
09/18/2014
Information Technology Essentials
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This class offers a broad coverage of technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. There will be a special emphasis on networks and distributed computing, including the World Wide Web. Other topics include: hardware and operating systems, software development tools and processes, relational databases, security and cryptography, enterprise applications, and electronic commerce. Hands-on exposure to Web, database, and graphical user interface (GUI) tools.
This course is intended for students with little or no background in computer technology. Students with extensive education or work experience in computer technology should consider taking a more advanced course.

Subject:
Applied Science
Business and Communication
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Malone, Thomas
Date Added:
02/01/2005
Information Technology as an Integrating Force in Manufacturing
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In virtually every industry and every firm, information technology is driving change, creating opportunities and challenges. Leaders who don't understand at least the fundamentals of information systems will be at a strategic disadvantage. This course provides broad coverage of technology concepts and trends underlying current and future developments in information technology, and fundamental principles for the effective use of computer-based information systems. There will be a special emphasis on manufacturing. Information Systems topics that will be covered include networks and distributed computing, including the World Wide Web, hardware and operating systems, software development tools and processes, relational databases, security and cryptography, enterprise applications, B2B, the semantic web and electronic commerce. Sloan LFM students with an interest in Information Systems are encouraged to register for this course.

Subject:
Business and Communication
Management
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Subirana, Brian
Date Added:
02/01/2003
Inquiry Based Project: Privacy v. Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This Problem-Based Learning Assignment addresses the following questions:

- When do Americans have the right to privacy?
- Are there ever any circumstances where Americans should give up certain rights to privacy in order to have greater security measures to be protected by the government?

Grabber: a John Oliver video and two articles about snapchat and internet privacy, relevant to students' worlds

Introductory mini lesson is included

In the Culminating Activity students are researching the FBI v. Apple debate. They are split into four group sand must collaborate together to come up with a stance their perspective would agree with alongside historical events in history that support their side.

Subject:
Social Science
Material Type:
Lesson Plan
Date Added:
10/10/2016
International Relations Theory in the Cyber Age
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course examines cyber dynamics and processes in international relations from different theoretical perspectives. It considers alternative theoretical and empirical frameworks consistent with characteristic features of cyberspace and emergent transformations at all levels of international interaction. Theories examined include realism and neorealism, institutionalism and liberalism, constructivism, and systems theory and lateral pressure. The course also highlights relevant features and proposes customized international relations theory for the cyber age.
Students taking the graduate version are expected to pursue the subject in greater depth through reading and individual research.

Subject:
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Choucri, Nazli
Date Added:
09/01/2015
Introduction to International Development Planning
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This introductory survey course is intended to develop an understanding of key issues and dilemmas of planning in non-Western countries. The issues covered by the course include state intervention, governance, law and institutions in development, privatization, participatory planning, decentralization, poverty, urban-rural linkages, corruption and civil service reform, trade and outsourcing and labor standards, post-conflict development and the role of aid in development.

Subject:
Cultural Geography
Economics
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Rajagopal, Balakrishnan
Date Added:
09/01/2011
Introduction to Technology and Policy
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course explores perspectives in the policy process - agenda setting, problem definition, framing the terms of debate, formulation and analysis of options, implementation and evaluation of policy outcomes using frameworks including economics and markets, law, and business and management. Methods include cost/benefit analysis, probabilistic risk assessment, and system dynamics. Exercises include developing skills to work on the interface between technology and societal issues; simulation exercises; case studies; and group projects that illustrate issues involving multiple stakeholders with different value structures, high levels of uncertainty, multiple levels of complexity; and value trade-offs that are characteristic of engineering systems. Emphasis on negotiation, team building and group dynamics, and management of multiple actors and leadership.

Subject:
Business and Communication
Management
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Ross, Dan
Weigel, Annalisa
Date Added:
09/01/2006
Japan and East Asian Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course explores Japan's role in world orders, past, present, and future. It focuses on Japanese conceptions of security; rearmament debates; the relationship of domestic politics to foreign policy; the impact of Japanese technological and economic transformation at home and abroad; alternative trade and security regimes; Japan's response to 9/11; and relations with Asian neighbors, Russia, and the alliance with the United States.

Subject:
Arts and Humanities
Economics
Political Science
Social Science
World Cultures
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Samuels, Richard
Date Added:
09/01/2016
K12 SIX Cybersecurity Frameworks (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

The K12 Security Information eXchange (K12 SIX) released “Cybersecurity Frameworks: What K-12 Leaders Need to Know,” a new resource for state and local education leaders encouraging the adoption of nationally recognized cybersecurity best practices. This white paper was commissioned by the State Educational Technology Directors Association (SETDA) as part of the work of its Cybersecurity & Privacy Collaborative.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
K12 SIX
Date Added:
10/18/2022
Living in an era of global terror
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

In this podcast, Professor Richard Aldrich from the School of Politics and International Relations, discusses the impact of globalisation, the opportunities this affords to global terrorists and the challenges faced by the intelligence services.

Globalisation has led to a free flow of money, people and ideas, which has benefited many people in the West in recent years and enhanced our standard of living, but the price paid is a reduction in security. As we see a shift towards a de-regulated global economy, with states removing controls over their borders, how does a state maintain its security? This has led to an increase in intelligence led activities and increasing expectations upon them.

In addition, Professor Aldrich discusses how mass communication has magnified the influence of terrorists and increased the problems faced by the security services. Finally, Professor Aldrich also discusses the challenges faced by the state in balancing our security, liberty and luxury. Are our civil liberties at risk?

Subject:
Social Science
Material Type:
Lecture
Provider:
University of Nottingham
Author:
Professor Richard Aldrich
Date Added:
03/21/2017
Living in an era of global terror
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this podcast, Professor Richard Aldrich from the School of Politics and International Relations, discusses the impact of globalisation, the opportunities this affords to global terrorists and the challenges faced by the intelligence services.

Globalisation has led to a free flow of money, people and ideas, which has benefited many people in the West in recent years and enhanced our standard of living, but the price paid is a reduction in security. As we see a shift towards a de-regulated global economy, with states removing controls over their borders, how does a state maintain its security? This has led to an increase in intelligence led activities and increasing expectations upon them.

In addition, Professor Aldrich discusses how mass communication has magnified the influence of terrorists and increased the problems faced by the security services. Finally, Professor Aldrich also discusses the challenges faced by the state in balancing our security, liberty and luxury. Are our civil liberties at risk?

Subject:
Social Science
Material Type:
Lecture
Provider:
University of Nottingham
Author:
Professor Richard Aldrich
Date Added:
03/22/2017
Medical Computing
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The focus of the course is on medical science and practice in the age of automation and the genome, both present and future.
It ncludes an analysis of the computational needs of clinical medicine, a review systems and approaches that have been used to support those needs, and an examination of new technologies.

Subject:
Applied Science
Biology
Business and Communication
Computer Science
Engineering
Health, Medicine and Nursing
Life Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Kohane, Isaac
Ohno-Machado, Lucila
Szolovits, Peter
Date Added:
02/01/2003
NSA Surveillance: A Debate
Unrestricted Use
CC BY
Rating
0.0 stars

Edward Snowden's revelations about government surveillance of private citizens sparked debate around the world about the trade off between privacy and security. The Institute for Humane Studies invited Professor Ronald Sievert of Texas A&M and Cindy Cohn, legal director for the Electronic Frontier Foundation to answer questions about government data collection. This is their debate.

Subject:
Political Science
Social Science
Material Type:
Lecture
Provider:
Institute for Humane Studies
Author:
Ronald Sievert
Date Added:
09/12/2017
Network and Computer Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration.

Subject:
Applied Science
Computer Science
Engineering
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Rivest, Ronald
Date Added:
02/01/2014
Nuclear Security
Unrestricted Use
CC BY
Rating
0.0 stars

Countering the Threat From States and Non-State Actors

Short Description:
The danger posed by nuclear weapons and fissile materials is ever present. The end of the Cold War and the significant reduction in the size of Russian and U.S. nuclear stockpiles did not change this fact of life. There are now nine states that possess nuclear weapons – the United States, Russia, the United Kingdom, France, China, Israel, India, Pakistan, and North Korea – and the number of nuclear weapons in the world in 2019 is estimated to be almost 14,000. In addition, the production of highly-enriched uranium and plutonium continues in several places, while more than 440 civilian nuclear facilities around the world are in operation, posing their own particular risks. When one also considers that non-state actors constitute a significant global danger and the potential for nuclear terrorism, it is clear the need for nuclear security remains paramount. There is no other type of weapon that comes close to doing the level of damage that nuclear weapons can inflict. Data dashboard

Word Count: 3351

(Note: This resource's metadata has been created automatically by reformatting and/or combining the information that the author initially provided as part of a bulk import process.)

Subject:
Career and Technical Education
Criminal Justice
Material Type:
Textbook
Provider:
Oregon State University
Author:
Ben Wickizer
David Bernell
Meredith Bowers
Date Added:
11/18/2019
Nuclear Weapons in International Politics: Past, Present and Future
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course will expose students to tools and methods of analysis for use in assessing the challenges and dangers associated with nuclear weapons in international politics. The first two weeks of the course will look at the technology and design of nuclear weapons and their means of production. The next five weeks will look at the role they played in the Cold War, the organizations that managed them, the technologies that were developed to deliver them, and the methods used to analyze nuclear force structures and model nuclear exchanges. The last six weeks of the course will look at theories and cases of nuclear decision making beyond the original five weapon states, and will look particularly at why states pursue or forego nuclear weapons, the role that individuals and institutions play, and the potential for both new sources of proliferation and new consequences.

Subject:
Arts and Humanities
History
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Cote, Owen
Walsh, James
Date Added:
02/01/2009
Operating Systems
Unrestricted Use
CC BY
Rating
0.0 stars

The course presents an overview of the history and structure of modern operating systems, analyzing in detail each of the major components of an operating system, and exploring more advanced topics in the field, such as security concerns. Upon successful completion of this course, the student will be able to: explain what an operating system does and how it is used; identify the various components of a computer system and how they interact with an operating system; describe the differences between a 32-bit and 64-bit operating system; explain the different types of operating systems and the major ones in use today; discuss the importance and use of threads and processes in an operating system; describe concurrency; explain the difference between a thread and a process; discuss context switching and how it is used in an operating system; describe synchronization; explain a race condition; discuss interprocess communication; describe how semaphores can be used in an operating system; discuss three of the classic synchronization problems; explain the alternatives to semaphores; discuss CPU scheduling and its relevance to operating systems; explain the general goals of CPU scheduling; describe the differences between pre-emptive and non-preemptive scheduling; discuss four CPU scheduling algorithms; explain what deadlock is in relation to operating systems; discuss deadlock prevention, avoidance, and their differences; describe deadlock detection and recovery; explain the memory hierarchy; discuss how the operating system interacts with memory; describe how virtual memory works; discuss three algorithms for dynamic memory allocation; explain methods of memory access; describe paging and page replacement algorithms; describe a file system and its purpose; discuss various file allocation methods; explain disk allocation and associated algorithms; discuss types of security threats; describe the various types of malware; explain basic security techniques; explain basic networking principles; discuss protocols and how they are used; explain reference models, particularly TCP/IP and OSI. (Computer Science 401)

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
The Saylor Foundation
Date Added:
11/16/2011
Politics of Security: British and West German Protest Movements and the Early Cold War 1945-1970
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The Politics of Security tells the story of how people experienced the cold war as a war. It is about the impact of the cold war on political cultures. This crucial issue is often forgotten in historical memory. In particular, the book follows British and West German anti-nuclear-weapons activists in their attempts to campaign for and create security after the destruction of the Second World War, and how their own version of security clashed with concepts advanced by their own governments. But the book also demonstrates how, as part of the protests against nuclear weapons, activists and their societies learned to live with the Bomb: it recounts how activists first discovered the dangers of nuclear weapons, but how a different generation of activists came to focus on other issues as the Vietnam War became their primary concern. And it makes comprehensible how activists in two societies who had fought each other fiercely in the battle of dictatorships and democracies of the Second World War could now come to see each other as part of a common campaign. Fundamentally, with its transnational approach, the book highlights how these two societies drew on very similar arguments when they came to understand the cold war through the prism of the previous world war. The book is the first to capture in a transnational fashion what activists did on the marches and what it meant to them and to others. The book thus reminds us that threats are not merely out there, but that they need to be created in a political process that involves struggles for power and contestation.

Subject:
Political Science
Social Science
Material Type:
Reading
Provider:
Oxford University Press
Author:
Holger Nehring
Date Added:
01/01/2013
Privacy and Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This unit defines privacy, confidentiality, and security of health information, including the HIPPA Privacy and Security Rules.

Subject:
Applied Science
Health, Medicine and Nursing
Material Type:
Lecture
Provider:
Open Michigan
Provider Set:
Health IT Workforce Curriculum
Author:
Oregon Health & Science University
Date Added:
09/26/2014
Privacy and Security for Teens
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

How safe are your students online? This lesson includes resources with facts and tips about online privacy and security for students. Students will 1.) evaluate resources for best practices in cyber privacy and security and 2.) identify a goal to strengthen an area of cyber privacy and security in their online behavior. (Thumbnail image attribute: Alpha Stock Images http://alphastockimages.com/)

Subject:
Electronic Technology
Information Science
Material Type:
Lesson Plan
Author:
Alyssa King
Tracy Cramer
MSDE Admin
Date Added:
07/17/2018