NCI Journal – Vol 2, No 1

Welcome to the 4th issue of the National Cybersecurity Institute Journal.

As the ever expanding cybersecurity community is now fully aware, our mission at NCI is to continue to increase the awareness and knowledge of the cybersecurity discipline, and assist the government, industry, military, and academic sectors to better understand and meet the challenges in cybersecurity policy, technology, and education by offering a peer-reviewed venue for current events, quality research, and applicable topics. In past issues of this journal we strove to provide timely and knowledgeable articles that would be well received by the cyber community. Here at NCI we will continue to publish relevant and noteworthy articles three times a year that will serve to enlighten those with a vested interest in the cybersecurity field. In this current issue, you will find articles from notable authors and subject matter experts with a variety of perspectives in the field of cybersecurity.

Miguel Alberto Gomez provides us with a very timely work on understanding the foundations of cyber espionage. This is followed by a fascinating article by Sharon L. Burton and Dustin Bessette on the war against identity cyber assault in social media. Aron Schwartz from Towson University then offers a case study, “The Exclusiveness of Malicious Software Called Spyware and Exploring Mitigating Techniques.” Ken Lerner and Matthew Berry from Argonne National Laboratory present a detailed look at regulation of cybersecurity in the financial sector. Gordon Romney and Dustin Fritz offer their views on cyber training with their article, “Cybersecurity Graduate Training Reveals Security-by-Obscurity Vulnerabilities in Website Authentication.” Teresa Ferrer-Mico and Miquel Angel Prats-Fernandez provide us with an interesting review of the scientific literature on MOOCs, Self Directed Learning (SDL), and educational taxonomies. Finally, we conclude the journal with an update on the latest cyber symposium that was held here at NCI— Security in Cyberspace.

I’m quite sure these articles will provide you, the reader, with knowledgeable insight that you will bring back to the workplace, and will hopefully instill in everyone who reads this a desire for further thought and research on the topics discussed.

It goes without saying that a publication such as this is never the work of one individual, but rather a collaboration of dedicated people here at NCI who work tirelessly to produce the quality product you have before you. My thanks go to all the contributors, administration, and staff for their extraordinary efforts in bringing the National Cybersecurity Institute Journal to our readers once again. I hope that everyone in the cyber community will find this journal informative as you work within your respective cyber areas. As always, I look forward to your comments, suggestions, and future submissions to our journal.

Dr. Jane A. LeClair
Editor in Chief

Download this issue as a PDF