Published on March 8, 2014
ONLINE EDUCATIONAL INCIDENT RESPONSE TRAINING: VIRTUAL WORLDS AS A COST EFFECTIVE TOOL FOR HOMELAND AND CYBER SECURITY. J. ABRAMSON, M. DAWSON, and D. BESSETTE. Department of Computer Science, Post University, 800 Country Club Road, Waterbury, CT, 06708.
Abstract Critical incident leadership and planning is an important topic in the field of homeland security. Within this field are many challenges. For the purposes of t his forum only two shall be discussed. The two challenges related to critical incident leadership and planning is the ability to learn in a simulated environment and funding. The first challenge surrounds learning as there is a significant cost associated in providing a real life scenarios where employees can learn. Employees need to understand how they should react in a simulated process to ensure that they can perform in the real event. This simulated scenario also allows an independent group to measure the effectiveness of the incident response manager. An inexpensive and effective method to do this would be through the utilization of Second Life (SL). SL is one of the most popular virtual world provides a unique and secure teaching and learning environment for instructors and students. This learning environment could be designed to be private for a specific response group or incident where each avatar assigned to a unique name could include the name of group name that the individual is belong to. The second issue, which surrounds funding, directly correlates with the capabilities and readiness to respond to a group. To properly correct this one would need to find a method to assign funding needs to risks or events that are most likely to occur.
Associated Research • Dawson, M., Marwan, O., & Abramson, J. (2014) Understanding the Methods Behind Cyber Terrorism. • • • • • • • • Encyclopedia of Information Science & Technology 3rd Edition. Dawson, M., Omar, M., Abramson, J., & Bessette, D. (2014). The Future of National and International Security on the Internet. Information Security in Diverse Computing Environments. Dawson, M., Al Saeed, I., Wright, J., & Onyegbula, F. (2014) Open Source Software to Enhance the STEM Learning Environment. Encyclopedia of Education and Technology. Dawson Jr., M. E., Crespo, M., & Brewster, S. (2013). DoD cyber technology policies to secure automated information systems. International Journal of Business Continuity and Risk Management, 4(1), 1-22. Omar, M., & Dawson, M. (2013, April). Research in Progress-Defending Android Smartphones from Malware Attacks. In Advanced Computing and Communication Technologies (ACCT), 2013 Third International Conference on (pp. 288-292). IEEE. Burrell, D. N., Dawson, M., Quisenberry, W., Finch, A., & Goliday, A. (2012). AN EXPLORATION OF GOVERNMENT TALENT MANAGEMENT STRATEGIES FOR INFORMATION ASSURANCE AND CYBER-SECURITY EMPLOYEES IN ORGANIZATIONS WITH PUBLIC HEALTH AND SAFETY MISSIONS. Journal of Knowledge & Human Resource Management, 4(8). Onyegbula, F., Dawson, M., & Stevens, J. (2011). UNDERSTANDING THE NEED AND IMPORTANCE OF THE CLOUD COMPUTING ENVIRONMENT WITHIN THE NATIONAL INSTITUTE OF FOOD AND AGRICULTURE, AN AGENCY OF THE UNITED STATES DEPARTMENT OF AGRICULTURE. Journal of Information Systems Technology & Planning, 4(8). Dawson, M. (2011, February). Applicability of web 2.0: Training for tactical military applications. In Global TIME (Vol. 2011, No. 1, pp. 395-398). Dawson, M., & Rahim, E. (2011). Transitional leadership in the defence and aerospace industry: a critical analysis for recruiting and developing talent. International Journal of Project Organisation and Management, 3(2), 164-183.
Second Life (SL): Map/Location
Identification of Key Targets
Weather Discussions – Business Continuity & Disaster Recovery Planning
SL: Campsite Mock Up
SL: Equipment Training
SL: MOSES Interrogation Scenario
3D Studio Max
Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...
In this presentation we will describe our experience developing with a highly dyna...
Presentation to the LITA Forum 7th November 2014 Albuquerque, NM
Un recorrido por los cambios que nos generará el wearabletech en el futuro
Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...
What is a Computer Security Incident Response ... education and safety training as ... a CSIRT. Developing an Effective Incident Cost ...
Training, technical assistance and exercise ... Training and educational opportunities ... full-scale cyber security exercise series addresses the ...
CERT training courses address many different aspects of ... a virtual training environment. ... Managing Computer Security Incident Response Teams;
Leading teams in cyber incidents and responses; ... Evaluating security incident response ... for cybersecurity awareness, education, training and ...
The National Training and Education (NTE) online ... of emergency management training to ... Response Framework, National Incident ...
Information security training, network & cyber security training, certification, and research in cyber defense, pentesting, ethical hacking, digital forensics.
... 2/13/2016 Hazardous Materials Incident Response: Operations. More Training. ... Homeland Security Training Consortium . ... training and educational ...
Online Cybersecurity training is offered by SANS Institute in a varied of modes ... Cyber Defense; Forensics & Incident Response; ... Online Security Training.
The Emergency Management Institute's ... of Homeland Security and FEMA’s goals by ... National Training and Education Online ...