NCI Journal – Vol 1, No 1
Welcome to the premiere edition of the National Cybersecurity Institute Journal.
The mission of the National Cybersecurity Institute is to increase awareness and knowledge of the cybersecurity discipline and assist the government, industry, military, and academic sectors to better understand and meet the challenges in cybersecurity policy, technology, and education. To that end, the National Cybersecurity Institute Journal will present relevant and noteworthy articles that will serve to enlighten those with a vested interest in the cybersecurity field. In this first edition, you will find six articles from notable authors with a variety of perspectives in the field.
Shana Kayne Beach presents an article on human factors in cybersecurity, which is often overlooked because cybersecurity education and training programs center primarily on technical and/or policy curricula. Jim Jones and Carl Beisel suggest the detection of novel cyber attacks in real time is difficult due to the large volume of data available, and an uncertain relationship between raw network data and novel attacks. They present us with an approach and experimental results addressing these challenges. Alireza Aghamohammadi and Ali Eydgahi propose a new method to prevent unwanted Web robots from accessing websites. Their method utilizes five identifiers — passkey, time, Internet Protocol address lookup, user agent, and number of visits for evaluation process — of granting access to Web robots. Brian M. Mazanec writes that the global community is increasingly dependent on cyberspace, but there are no clearly agreed-upon norms for acceptable state behavior in cyberspace. He presents a paper that offers a framework to help explain how norms for cyber warfare are likely to develop.
Gordon Romney, Miles Romney, Bhaskar Sinha, Pradip P. Dey, and Mohammad N. Amin discuss the power of ‘Rails,’ which was selected for CSIA, at the suggestion of an industry collaborator, because it enforces good coding habits, encourages better security practices, is used in cyber tool creation, and its framework facilitates agile development and course delivery. Finally, Aftab Ahmad and Ping Wang present an analysis of security assessment of wireless LANs (WLANs) in a classified environment. The analysis is based on a technique derived from ITU Recommendation X.805.
A publication is never the work of one individual, but rather a collaboration of dedicated people who work tirelessly to produce a quality product. A great many thanks go to all the contributors, administration, and staff for their efforts to bring the National Cybersecurity Institute Journal to fruition. I am sure you will find this journal informative as the cybersecurity field continues to evolve. I look forward to your comments, suggestions, and future submissions to our journal.
Dr. Jane A. LeClair
Editor in Chief