Stephen D. Burd
University of New Mexico
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Stephen D. Burd.
technical symposium on computer science education | 2006
William I. Bullers; Stephen D. Burd; Alessandro F. Seazzu
Virtual machines provide a secure environment within which students may install, configure, and experiment with operating system, network, and database software. This paper describes experiences teaching three advanced courses in system and network administration, information security and assurance, and database administration using VMware workstation in a shared student laboratory. The paper describes benefits and challenges in course and lab configuration, security, and administration.
Information Resources Management Journal | 2011
Xin (Robert) Luo; Richard G. Brody; Alessandro F. Seazzu; Stephen D. Burd
Effective information systems security management combines technological measures and managerial efforts. Although various technical means have been employed to cope with security threats, human factors have been comparatively neglected. This article examines human factors that can lead to social engineering intrusions. Social engineering is a technique used by malicious attackers to gain access to desired information by exploiting the flaws in human logic known as cognitive biases. Social engineering is a potential threat to information security and should be considered equally important to its technological counterparts. This article unveils various social engineering attacks and their leading human factors, and discusses several ways to defend against social engineering: education, training, procedure, and policy. The authors further introduce possible countermeasures for social engineering attacks. Future analysis is also presented.
hawaii international conference on system sciences | 2011
Stephen D. Burd; Gregory Gaillard; Eugene Rooney; Alessandro F. Seazzu
Virtual computing laboratories provide remote user access to standardized computing resources and enable many types of complex experiential and project-based learning applicable in the simulation of information warfare exercises, incident response training and digital forensics analysis. As more universities and government agencies consider implementing VLABs, they are faced with choosing an appropriate architecture and infrastructure components. This paper reports on a current VLAB implementation using VMware virtualization products. We describe the system architecture and report on benefits and challenges of the architecture and supporting infrastructure including issues of accessibility, administrative complexity, security, performance, configuration, and integration with other University IT resources and services. Our report is intended to guide faculty and administrators considering a similar implementation with lessons learned from our experience.
Computers & Security | 2013
Xin (Robert) Luo; Wei Zhang; Stephen D. Burd; Alessandro F. Seazzu
To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we develop a theoretical model of victimization by phishing based on the Heuristic-Systematic Model of information processing. We argue that the Heuristic-Systematic Model offers an ideal theoretical framework for investigating the psychological mechanism underlying the effectiveness of phishing attacks. An exploratory experiment is presented to validate the research model based on the theory.
Journal of Information Technology Education | 2009
Stephen D. Burd; Alessandro F. Seazzu; Christopher Conway
Current technology enables schools to provide remote or virtual computing labs. Virtual computing labs can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to dedicated workstations and supporting students enrolled in degree programs in management. Such a lab can be implemented at relatively low cost by reallocating resources dedicated to existing physical labs.
hawaii international conference on system sciences | 2013
Stephen D. Burd; Xin (Robert) Luo; Alessandro F. Seazzu
Virtual computing laboratories are widely implemented in universities, especially to support teaching and research in areas such as engineering, computer science, and information assurance. Most existing labs that support teaching or a combination of teaching and research are internally implemented and managed. Some universities are considering migrating their in-house labs into the cloud using solutions provided by multiple vendors. This paper explores the practical aspects of such a migration and describes costs, benefits, and challenges.
hawaii international conference on system sciences | 2012
Wei Zhang; Xin (Robert) Luo; Stephen D. Burd; Alessandro F. Seazzu
To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we propose a study on victimization by phishing based on the Heuristic-Systematic Model of information processing. We argue that the Heuristic-Systematic Model offers an ideal theoretical framework for investigating the psychological mechanism underlying the effectiveness of phishing attacks, and present a preliminary research model based on the theory.
hawaii international conference on system sciences | 2009
Kara L. Nance; Brian Hay; Ronald Dodge; James Wrubel; Stephen D. Burd; Alessandro F. Seazzu
Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of the current isolated and remote access labs that institutions could use as models to minimize the effort required to create or access a working computer security lab without investing the years of effort that the original creators did. Laboratory attributes investigated include scalability, access capabilities, teaching environments, time requirements, and cost requirements. Additionally a discussion of the challenges associated with each environment is presented. Finally, a model for sharing remote access laboratory capabilities is delineated as an alternative for programs for which the creation of a local remote access lab would not be cost effective and some future investigation areas are identified.
Operations Research | 1991
Stephen D. Burd; Suleiman K. Kassicieh
This paper reports on a decision support system DSS for computer capacity planning. The system was developed for Sandia National Laboratories SNL to support planning in an environment characterized by large-scale scientific computing needs, governmental budgetary limitations and specific planning documentation required by the funding source. The implementation of the system is based directly on the concepts of relational model management and logic-based model representation and manipulation. The implementation vehicle for this system is an extended version of Prolog, which allows interactions with externally defined computational routines and sources of data. This vehicle provides for the integration of various data sources with a set of models for estimating capacity requirements and optimizing different objective functions subject to budgetary constraints.
hawaii international conference on system sciences | 2011
Stephen D. Burd; Darrin E. Jones; Alessandro F. Seazzu
Digital forensics approaches used by national security and law enforcement agencies have evolved along separate lines to serve different purposes. As a result, practices, tools, and techniques used by each agency group differ. The changing nature of national security threats and the increasing sophistication of domestic digital crime necessitates bridging the different approaches. This paper compares and contrasts the historic and current differences between digital forensics and describes how and why those differences must be bridged.