Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Charles E. Frank is active.

Publication


Featured researches published by Charles E. Frank.


information security curriculum development | 2008

Evaluation of Google hacking

Justin Billig; Yuri Danilchenko; Charles E. Frank

Google Hacking uses the Google search engine to locate sensitive information or to find vulnerabilities that may be exploited. This paper evaluates how much effort it takes to get Google Hacking to work and how serious the threat of Google Hacking is. The paper discusses the countermeasures that can be used against Google Hacking.


information security curriculum development | 2006

Secure software engineering teaching modules

James Walden; Charles E. Frank

We are designing a course in secure software engineering that will teach students how to incorporate security throughout the software development lifecycle. The class will serve as a capstone for a new graduate certificate in secure software engineering. This paper describes the class goals, the design for the class, and the materials that we will develop to teach secure software engineering. We are creating ten modules to cover the core topics in software security. Each module will cover one or more class goals and will consist of both explanatory materials and assignments to give students the opportunity to apply their learnings in a small context. The modules will be developed over the Summer and Fall of 2006, and the class will be first offered in Spring 2007. The class will also incorporate a team-based web development project that students will work on throughout the semester to gain experience applying security principles to a large-scale project.


2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) | 2011

Profiling file repository access patterns for identifying data exfiltration activities

Yi Hu; Charles E. Frank; James Walden; Emily Crawford; Dhanuja Kasturiratna

Studies show that a significant number of employees steal data when changing jobs. Insider attackers who have the authorization to access the best-kept secrets of organizations pose a great challenge for organizational security. Although increasing efforts have been spent on identifying insider attacks, little research concentrates on detecting data exfiltration activities. This paper proposes a model for identifying data exfiltration activities by insiders. It uses statistical methods to profile legitimate uses of file repositories by authorized users. By analyzing legitimate file repository access logs, user access profiles are created and can be employed to detect a large set of data exfiltration activities. The effectiveness of the proposed model was tested with file access histories from the subversion logs of the popular open source project KDE.


information security curriculum development | 2009

The usability of end user cryptographic products

Michael Sweikata; Gary Watson; Charles E. Frank; Chris Christensen; Yi Hu

Cryptography is an indispensable tool for securing data and for ensuring the privacy of communications such as web browsing and email. Although there are many practical utilities which can encrypt disks, file systems, and emails, these utilities are still not widely adopted by end users. One intention of cryptographic utilities is to enhance the confidentiality of information. From the security practitioners point of view, cryptography is a must for protecting sensitive data. System administrators and technical savvy people not only think many existing cryptography products are useful but also usable, at least to some extent. However, when viewed by majority of end users who do not have the technical background on cryptography, key and password management, authentication, and the complexity for using cryptography products can be the hurdles for making these utilities usable. This paper studies free and low-cost cryptographic products including encrypted flash drives, hard drives, file systems, and email systems to assess their usability. We also make recommendations for usable end-user cryptography.


acm southeast regional conference | 2005

Information assurance in the undergraduate curriculum

Bhagyavati; Michael Olan; David R. Naugler; Charles E. Frank

Information assurance and systems security are important topics that compel the attention of future computer scientists. Typically, undergraduate students in computer science programs today are exposed to these concepts at the end of their education in stand-alone courses on information security. As information assurance (IA) educators, we perceive the need to incorporate IA topics throughout the undergraduate CS curriculum. In this panel, we will first present the goals, challenges, and current state of progress made at our respective institutions. Then we will solicit feedback and suggestions from the audience for better integrating IA topics across the undergraduate curriculum.


MSCCC '04 Proceedings of the 2nd annual conference on Mid-south college computing | 2004

Experiences hosting high school summer camps to promote university outreach

Richard Fox; Gary Newell; Charles E. Frank


Journal of Computing Sciences in Colleges | 2005

Teaching user interface prototyping

Charles E. Frank; David R. Naugler; Michael Traina


Journal of Computing Sciences in Colleges | 2002

Laboratory exercises for a computer security course

Charles E. Frank; Gregory A. Wells


Journal of Computing Sciences in Colleges | 2005

Network security laboratories using SmoothWall

Jason Kretzer; Charles E. Frank


information security curriculum development | 2011

The value of the CISSP certification for educators and professionals

Charles E. Frank; Laurie Werner

Collaboration


Dive into the Charles E. Frank's collaboration.

Top Co-Authors

Avatar

Laurie Werner

Miami University Hamilton

View shared research outputs
Top Co-Authors

Avatar

James Walden

Northern Kentucky University

View shared research outputs
Top Co-Authors

Avatar

David R. Naugler

Southeast Missouri State University

View shared research outputs
Top Co-Authors

Avatar

Yi Hu

Northern Kentucky University

View shared research outputs
Top Co-Authors

Avatar

Dhanuja Kasturiratna

Northern Kentucky University

View shared research outputs
Top Co-Authors

Avatar

Michael Olan

Richard Stockton College of New Jersey

View shared research outputs
Top Co-Authors

Avatar

Robert Montante

Bloomsburg University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Bhagyavati

Columbus State University

View shared research outputs
Top Co-Authors

Avatar

Cathy Bareiss

Olivet Nazarene University

View shared research outputs
Top Co-Authors

Avatar

Chris Christensen

Northern Kentucky University

View shared research outputs
Researchain Logo
Decentralizing Knowledge