1-4 of 4 results
-
Exploring vulnerabilities, threats, and exploits in small unmanned aerial systems (sUAS)
PI John Craiger
Small unmanned aerial systems (sUAS), also known as drones, have been called flying computers given the overlap in their technologies. The purpose of this research is to conduct cybersecurity vulnerability assessments of several sUAS to identify vulnerabilities, threats, and associated exploits to the sUAS. Cyber vulnerabilities could theoretically allow a bad actor to take control of the sUAS, cause it to malfunction while in flight, and more.
Read moreCategories: Faculty-Staff
-
Research and update SSCP Study Guide to 3d Edition
PI Michael Wills
Research current cybersecurity industry best practices, threat intelligence, and regulatory requirements, as part of publisher update for (ISC)2 Systems Security Certified Professional Study Guide, 3d Edition
Read moreCategories: Faculty-Staff
-
Update content and teaching design, CISSP Official Training Course, to meet 2021 best security practices
PI Michael Wills
Research, curate, and redevelop all course materials to meet 2021 best cybersecurity practices and certification requirements for (ISC)2 Certified Information Systems Security Professional program
Read moreCategories: Faculty-Staff
-
Research, Curate, Update content and teaching design, SSCP Official Training Course, to meet 2021 best security practices
PI Michael Wills
Research, curate, and redevelop all course materials to meet 2021 best cybersecurity practices and certification requirements for (ISC)2 Systems Security Certified Professional program
Read moreCategories: Faculty-Staff
1-4 of 4 results