Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Stephen D. Burd is active.

Publication


Featured researches published by Stephen D. Burd.


technical symposium on computer science education | 2006

Virtual machines - an idea whose time has returned: application to network, security, and database courses

William I. Bullers; Stephen D. Burd; Alessandro F. Seazzu

Virtual machines provide a secure environment within which students may install, configure, and experiment with operating system, network, and database software. This paper describes experiences teaching three advanced courses in system and network administration, information security and assurance, and database administration using VMware workstation in a shared student laboratory. The paper describes benefits and challenges in course and lab configuration, security, and administration.


Information Resources Management Journal | 2011

Social Engineering: The Neglected Human Factor for Information Security Management

Xin (Robert) Luo; Richard G. Brody; Alessandro F. Seazzu; Stephen D. Burd

Effective information systems security management combines technological measures and managerial efforts. Although various technical means have been employed to cope with security threats, human factors have been comparatively neglected. This article examines human factors that can lead to social engineering intrusions. Social engineering is a technique used by malicious attackers to gain access to desired information by exploiting the flaws in human logic known as cognitive biases. Social engineering is a potential threat to information security and should be considered equally important to its technological counterparts. This article unveils various social engineering attacks and their leading human factors, and discusses several ways to defend against social engineering: education, training, procedure, and policy. The authors further introduce possible countermeasures for social engineering attacks. Future analysis is also presented.


hawaii international conference on system sciences | 2011

Virtual Computing Laboratories Using VMware Lab Manager

Stephen D. Burd; Gregory Gaillard; Eugene Rooney; Alessandro F. Seazzu

Virtual computing laboratories provide remote user access to standardized computing resources and enable many types of complex experiential and project-based learning applicable in the simulation of information warfare exercises, incident response training and digital forensics analysis. As more universities and government agencies consider implementing VLABs, they are faced with choosing an appropriate architecture and infrastructure components. This paper reports on a current VLAB implementation using VMware virtualization products. We describe the system architecture and report on benefits and challenges of the architecture and supporting infrastructure including issues of accessibility, administrative complexity, security, performance, configuration, and integration with other University IT resources and services. Our report is intended to guide faculty and administrators considering a similar implementation with lessons learned from our experience.


Computers & Security | 2013

Investigating phishing victimization with the Heuristic-Systematic Model: A theoretical framework and an exploration

Xin (Robert) Luo; Wei Zhang; Stephen D. Burd; Alessandro F. Seazzu

To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we develop a theoretical model of victimization by phishing based on the Heuristic-Systematic Model of information processing. We argue that the Heuristic-Systematic Model offers an ideal theoretical framework for investigating the psychological mechanism underlying the effectiveness of phishing attacks. An exploratory experiment is presented to validate the research model based on the theory.


Journal of Information Technology Education | 2009

Virtual Computing Laboratories: A Case Study with Comparisons to Physical Computing Laboratories.

Stephen D. Burd; Alessandro F. Seazzu; Christopher Conway

Current technology enables schools to provide remote or virtual computing labs. Virtual computing labs can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to dedicated workstations and supporting students enrolled in degree programs in management. Such a lab can be implemented at relatively low cost by reallocating resources dedicated to existing physical labs.


hawaii international conference on system sciences | 2013

Cloud-Based Virtual Computing Laboratories

Stephen D. Burd; Xin (Robert) Luo; Alessandro F. Seazzu

Virtual computing laboratories are widely implemented in universities, especially to support teaching and research in areas such as engineering, computer science, and information assurance. Most existing labs that support teaching or a combination of teaching and research are internally implemented and managed. Some universities are considering migrating their in-house labs into the cloud using solutions provided by multiple vendors. This paper explores the practical aspects of such a migration and describes costs, benefits, and challenges.


hawaii international conference on system sciences | 2012

How Could I Fall for That? Exploring Phishing Victimization with the Heuristic-Systematic Model

Wei Zhang; Xin (Robert) Luo; Stephen D. Burd; Alessandro F. Seazzu

To the extent that phishing has become a serious threat to information security, there has been rather limited theory-grounded research on this burgeoning phenomenon. In this paper, we propose a study on victimization by phishing based on the Heuristic-Systematic Model of information processing. We argue that the Heuristic-Systematic Model offers an ideal theoretical framework for investigating the psychological mechanism underlying the effectiveness of phishing attacks, and present a preliminary research model based on the theory.


hawaii international conference on system sciences | 2009

Replicating and Sharing Computer Security Laboratory Environments

Kara L. Nance; Brian Hay; Ronald Dodge; James Wrubel; Stephen D. Burd; Alessandro F. Seazzu

Many institutions are currently investigating the feasibility of creating Computer Security Laboratory environments for their researchers and students. This paper compares four of the current isolated and remote access labs that institutions could use as models to minimize the effort required to create or access a working computer security lab without investing the years of effort that the original creators did. Laboratory attributes investigated include scalability, access capabilities, teaching environments, time requirements, and cost requirements. Additionally a discussion of the challenges associated with each environment is presented. Finally, a model for sharing remote access laboratory capabilities is delineated as an alternative for programs for which the creation of a local remote access lab would not be cost effective and some future investigation areas are identified.


Operations Research | 1991

Decision support for supercomputer acquisition

Stephen D. Burd; Suleiman K. Kassicieh

This paper reports on a decision support system DSS for computer capacity planning. The system was developed for Sandia National Laboratories SNL to support planning in an environment characterized by large-scale scientific computing needs, governmental budgetary limitations and specific planning documentation required by the funding source. The implementation of the system is based directly on the concepts of relational model management and logic-based model representation and manipulation. The implementation vehicle for this system is an extended version of Prolog, which allows interactions with externally defined computational routines and sources of data. This vehicle provides for the integration of various data sources with a set of models for estimating capacity requirements and optimizing different objective functions subject to budgetary constraints.


hawaii international conference on system sciences | 2011

Bridging Differences in Digital Forensics for Law Enforcement and National Security

Stephen D. Burd; Darrin E. Jones; Alessandro F. Seazzu

Digital forensics approaches used by national security and law enforcement agencies have evolved along separate lines to serve different purposes. As a result, practices, tools, and techniques used by each agency group differ. The changing nature of national security threats and the increasing sophistication of domestic digital crime necessitates bridging the different approaches. This paper compares and contrasts the historic and current differences between digital forensics and describes how and why those differences must be bridged.

Collaboration


Dive into the Stephen D. Burd's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wei Zhang

University of Massachusetts Boston

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andrew B. Whinston

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Brian Hay

University of Alaska Fairbanks

View shared research outputs
Top Co-Authors

Avatar

Eugene Rooney

University of New Mexico

View shared research outputs
Researchain Logo
Decentralizing Knowledge