SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
ONLINE EDUCATIONAL INCIDENT RESPONSE
TRAINING: VIRTUAL WORLDS AS A COST
EFFECTIVE TOOL FOR HOMELAND AND
CYBER SECURITY.
J. ABRAMSON, M. DAWSON, and D.
BESSETTE. Department of Computer
Science, Post University, 800 Country Club
Road, Waterbury, CT, 06708.
Abstract
Critical incident leadership and planning is an important topic in the field of
homeland security. Within this field are many challenges. For the purposes of t his
forum only two shall be discussed. The two challenges related to critical incident
leadership and planning is the ability to learn in a simulated environment and
funding. The first challenge surrounds learning as there is a significant cost
associated in providing a real life scenarios where employees can learn.
Employees need to understand how they should react in a simulated process to
ensure that they can perform in the real event. This simulated scenario also allows
an independent group to measure the effectiveness of the incident response
manager. An inexpensive and effective method to do this would be through the
utilization of Second Life (SL). SL is one of the most popular virtual world provides
a unique and secure teaching and learning environment for instructors and
students. This learning environment could be designed to be private for a specific
response group or incident where each avatar assigned to a unique name could
include the name of group name that the individual is belong to. The second issue,
which surrounds funding, directly correlates with the capabilities and readiness to
respond to a group. To properly correct this one would need to find a method to
assign funding needs to risks or events that are most likely to occur.
Associated Research
• Dawson, M., Marwan, O., & Abramson, J. (2014) Understanding the Methods Behind Cyber Terrorism.
•
•
•
•

•

•

•
•

Encyclopedia of Information Science & Technology 3rd Edition.
Dawson, M., Omar, M., Abramson, J., & Bessette, D. (2014). The Future of National and International
Security on the Internet. Information Security in Diverse Computing Environments.
Dawson, M., Al Saeed, I., Wright, J., & Onyegbula, F. (2014) Open Source Software to Enhance the
STEM Learning Environment. Encyclopedia of Education and Technology.
Dawson Jr., M. E., Crespo, M., & Brewster, S. (2013). DoD cyber technology policies to secure automated
information systems. International Journal of Business Continuity and Risk Management, 4(1), 1-22.
Omar, M., & Dawson, M. (2013, April). Research in Progress-Defending Android Smartphones from
Malware Attacks. In Advanced Computing and Communication Technologies (ACCT), 2013 Third
International Conference on (pp. 288-292). IEEE.
Burrell, D. N., Dawson, M., Quisenberry, W., Finch, A., & Goliday, A. (2012). AN EXPLORATION OF
GOVERNMENT TALENT MANAGEMENT STRATEGIES FOR INFORMATION ASSURANCE AND
CYBER-SECURITY EMPLOYEES IN ORGANIZATIONS WITH PUBLIC HEALTH AND SAFETY
MISSIONS. Journal of Knowledge & Human Resource Management, 4(8).
Onyegbula, F., Dawson, M., & Stevens, J. (2011). UNDERSTANDING THE NEED AND IMPORTANCE OF
THE CLOUD COMPUTING ENVIRONMENT WITHIN THE NATIONAL INSTITUTE OF FOOD AND
AGRICULTURE, AN AGENCY OF THE UNITED STATES DEPARTMENT OF AGRICULTURE. Journal of
Information Systems Technology & Planning, 4(8).
Dawson, M. (2011, February). Applicability of web 2.0: Training for tactical military applications. In Global
TIME (Vol. 2011, No. 1, pp. 395-398).
Dawson, M., & Rahim, E. (2011). Transitional leadership in the defence and aerospace industry: a critical
analysis for recruiting and developing talent. International Journal of Project Organisation and Management,
3(2), 164-183.
Second Life (SL): Map/Location
SL: Map/Location
Identification of Key Targets
Weather Discussions – Business
Continuity & Disaster Recovery
Planning
Interactive Walkthroughs
SL: Campsite Mock Up
SL: Equipment Training
SL: MOSES Interrogation Scenario
OpenSimulator (OpenSIM)
Viewers
3D Studio Max
Blender
Scenario Planning
Key Terms

Weitere ähnliche Inhalte

Ähnlich wie ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFECTIVE TOOL FOR HOMELAND AND CYBER SECURITY

NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
 
TECHNOLOGY LEARNING ENVIRONMENTS IN A VIRTUAL SANDBOX
TECHNOLOGY LEARNING ENVIRONMENTS IN A VIRTUAL SANDBOXTECHNOLOGY LEARNING ENVIRONMENTS IN A VIRTUAL SANDBOX
TECHNOLOGY LEARNING ENVIRONMENTS IN A VIRTUAL SANDBOXMaurice Dawson
 
Open source technologies to assist with science
Open source technologies to assist with scienceOpen source technologies to assist with science
Open source technologies to assist with scienceMaurice Dawson
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementConnie White
 
A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...UltraUploader
 
Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021AIRCC Publishing Corporation
 
Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdfclientmentailai
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safelyAlexander Decker
 
Gamification, Social Media, and Digital Communication: Enhancing Communicatio...
Gamification, Social Media, and Digital Communication: Enhancing Communicatio...Gamification, Social Media, and Digital Communication: Enhancing Communicatio...
Gamification, Social Media, and Digital Communication: Enhancing Communicatio...Nicholas Tancredi
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2IAEME Publication
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONClaire Webber
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2Claire Webber
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationMangaiK4
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationMangaiK4
 
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...IJCI JOURNAL
 
Innovation in technology
Innovation in technologyInnovation in technology
Innovation in technologyppd1961
 
Kurzweil and Diamandis TED Conference Slideshow
Kurzweil and Diamandis TED Conference SlideshowKurzweil and Diamandis TED Conference Slideshow
Kurzweil and Diamandis TED Conference Slideshowkkleiner
 

Ähnlich wie ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFECTIVE TOOL FOR HOMELAND AND CYBER SECURITY (20)

NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
TECHNOLOGY LEARNING ENVIRONMENTS IN A VIRTUAL SANDBOX
TECHNOLOGY LEARNING ENVIRONMENTS IN A VIRTUAL SANDBOXTECHNOLOGY LEARNING ENVIRONMENTS IN A VIRTUAL SANDBOX
TECHNOLOGY LEARNING ENVIRONMENTS IN A VIRTUAL SANDBOX
 
Open source technologies to assist with science
Open source technologies to assist with scienceOpen source technologies to assist with science
Open source technologies to assist with science
 
Akram.pptx
Akram.pptxAkram.pptx
Akram.pptx
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...A theoretical model of differential social attributions toward computing tech...
A theoretical model of differential social attributions toward computing tech...
 
Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021
 
Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdf
 
Cyber security rule of use internet safely
Cyber security rule of use internet safelyCyber security rule of use internet safely
Cyber security rule of use internet safely
 
Gamification, Social Media, and Digital Communication: Enhancing Communicatio...
Gamification, Social Media, and Digital Communication: Enhancing Communicatio...Gamification, Social Media, and Digital Communication: Enhancing Communicatio...
Gamification, Social Media, and Digital Communication: Enhancing Communicatio...
 
A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2A review of cyberbullying and cyber threats in education 2
A review of cyberbullying and cyber threats in education 2
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONA REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION
 
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for Education
 
A Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for EducationA Framework for Desktop Virtual Reality Application for Education
A Framework for Desktop Virtual Reality Application for Education
 
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
 
Innovation in technology
Innovation in technologyInnovation in technology
Innovation in technology
 
Kurzweil and Diamandis TED Conference Slideshow
Kurzweil and Diamandis TED Conference SlideshowKurzweil and Diamandis TED Conference Slideshow
Kurzweil and Diamandis TED Conference Slideshow
 

Mehr von Maurice Dawson

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsMaurice Dawson
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Maurice Dawson
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsMaurice Dawson
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Maurice Dawson
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyMaurice Dawson
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMaurice Dawson
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMaurice Dawson
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Maurice Dawson
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...Maurice Dawson
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Maurice Dawson
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramMaurice Dawson
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Maurice Dawson
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMaurice Dawson
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...Maurice Dawson
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Maurice Dawson
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyMaurice Dawson
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityMaurice Dawson
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsMaurice Dawson
 

Mehr von Maurice Dawson (20)

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure SectorsUnderstanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors
 
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
Unprotected Data: Your Risk of Internet-Enabled Psychological and Information...
 
Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
 
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...Framework for the Development of Virtual Labs for Industrial Internet of Thin...
Framework for the Development of Virtual Labs for Industrial Internet of Thin...
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
CTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and DestroyCTRL, Search, Exploit, and Destroy
CTRL, Search, Exploit, and Destroy
 
MWAIS Fall 2017 Newsletter
MWAIS Fall 2017 NewsletterMWAIS Fall 2017 Newsletter
MWAIS Fall 2017 Newsletter
 
MWAIS Fall 2018 Newsletter
MWAIS Fall 2018 NewsletterMWAIS Fall 2018 Newsletter
MWAIS Fall 2018 Newsletter
 
Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...Information Technology Use in West African Agriculture – challenges and oppor...
Information Technology Use in West African Agriculture – challenges and oppor...
 
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
The Case for IT Training within Guinea’s Ministry of Agriculture: Evaluating ...
 
Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS Schedule for the 13th Annual Conference of the Midwest AIS
Schedule for the 13th Annual Conference of the Midwest AIS
 
UMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer ProgramUMSL IS | Farmer 2 Farmer Program
UMSL IS | Farmer 2 Farmer Program
 
Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018Midwest Association for Information Systems - MWAIS2018
Midwest Association for Information Systems - MWAIS2018
 
MWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual ConferenceMWAIS 2018 - 13th Annual Conference
MWAIS 2018 - 13th Annual Conference
 
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
MWAIS 2018 : 13th Annual Conference of the Midwest Association for Informatio...
 
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
Technological Advancements for Intelligence Collection, Analysis, and Dissemi...
 
Hacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected SocietyHacking, Privacy and Security in a Hyperconnected Society
Hacking, Privacy and Security in a Hyperconnected Society
 
University of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber SecurityUniversity of Missouri - Saint Louis Cyber Security
University of Missouri - Saint Louis Cyber Security
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFECTIVE TOOL FOR HOMELAND AND CYBER SECURITY

  • 1. ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFECTIVE TOOL FOR HOMELAND AND CYBER SECURITY. J. ABRAMSON, M. DAWSON, and D. BESSETTE. Department of Computer Science, Post University, 800 Country Club Road, Waterbury, CT, 06708.
  • 2. Abstract Critical incident leadership and planning is an important topic in the field of homeland security. Within this field are many challenges. For the purposes of t his forum only two shall be discussed. The two challenges related to critical incident leadership and planning is the ability to learn in a simulated environment and funding. The first challenge surrounds learning as there is a significant cost associated in providing a real life scenarios where employees can learn. Employees need to understand how they should react in a simulated process to ensure that they can perform in the real event. This simulated scenario also allows an independent group to measure the effectiveness of the incident response manager. An inexpensive and effective method to do this would be through the utilization of Second Life (SL). SL is one of the most popular virtual world provides a unique and secure teaching and learning environment for instructors and students. This learning environment could be designed to be private for a specific response group or incident where each avatar assigned to a unique name could include the name of group name that the individual is belong to. The second issue, which surrounds funding, directly correlates with the capabilities and readiness to respond to a group. To properly correct this one would need to find a method to assign funding needs to risks or events that are most likely to occur.
  • 3. Associated Research • Dawson, M., Marwan, O., & Abramson, J. (2014) Understanding the Methods Behind Cyber Terrorism. • • • • • • • • Encyclopedia of Information Science & Technology 3rd Edition. Dawson, M., Omar, M., Abramson, J., & Bessette, D. (2014). The Future of National and International Security on the Internet. Information Security in Diverse Computing Environments. Dawson, M., Al Saeed, I., Wright, J., & Onyegbula, F. (2014) Open Source Software to Enhance the STEM Learning Environment. Encyclopedia of Education and Technology. Dawson Jr., M. E., Crespo, M., & Brewster, S. (2013). DoD cyber technology policies to secure automated information systems. International Journal of Business Continuity and Risk Management, 4(1), 1-22. Omar, M., & Dawson, M. (2013, April). Research in Progress-Defending Android Smartphones from Malware Attacks. In Advanced Computing and Communication Technologies (ACCT), 2013 Third International Conference on (pp. 288-292). IEEE. Burrell, D. N., Dawson, M., Quisenberry, W., Finch, A., & Goliday, A. (2012). AN EXPLORATION OF GOVERNMENT TALENT MANAGEMENT STRATEGIES FOR INFORMATION ASSURANCE AND CYBER-SECURITY EMPLOYEES IN ORGANIZATIONS WITH PUBLIC HEALTH AND SAFETY MISSIONS. Journal of Knowledge & Human Resource Management, 4(8). Onyegbula, F., Dawson, M., & Stevens, J. (2011). UNDERSTANDING THE NEED AND IMPORTANCE OF THE CLOUD COMPUTING ENVIRONMENT WITHIN THE NATIONAL INSTITUTE OF FOOD AND AGRICULTURE, AN AGENCY OF THE UNITED STATES DEPARTMENT OF AGRICULTURE. Journal of Information Systems Technology & Planning, 4(8). Dawson, M. (2011, February). Applicability of web 2.0: Training for tactical military applications. In Global TIME (Vol. 2011, No. 1, pp. 395-398). Dawson, M., & Rahim, E. (2011). Transitional leadership in the defence and aerospace industry: a critical analysis for recruiting and developing talent. International Journal of Project Organisation and Management, 3(2), 164-183.
  • 4. Second Life (SL): Map/Location
  • 7. Weather Discussions – Business Continuity & Disaster Recovery Planning