2013 IEEE Third International Conference on Information Science and Technology (ICIST), 2013
ABSTRACT Any communications network is subject to becoming the target of exploitation by criminal... more ABSTRACT Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hacker's attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStreamX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to 'worst case scenario' emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.
International Journal of Computer Science and Information Technology
Society is inextricably dependent on the Internet and other globally interconnected infrastructur... more Society is inextricably dependent on the Internet and other globally interconnected infrastructures used in the provisioning of information services. The growth of information technology (IT) and information systems (IS) over the past decades has created an unprecedented demand for access to information. The implication of wireless mobility are great, and the commercial possibilities of new and innovative wireless flexibility are just beginning to be realized through the emergence of the Internet of Things (IoT). This article takes a look the history of hacking and professionalization of the hacker industry. As the hacker industry becomes more fully professionalized, it is becoming much more adaptive and flexible, making it harder for intelligence and law enforcement to confront. Furthermore, the hacker industry is blurring the distinction between motivated crime and traditional computer security threats - including the disruption of critical infrastructures or the penetration of ne...
Summary form only given. The Internet of Things (IoT) is an integrated part of the future Interne... more Summary form only given. The Internet of Things (IoT) is an integrated part of the future Internet with self-configuring capabilities based on interoperable communication protocols where physical and virtual `things/objects' have identities, physical attributes and are seamlessly integrated into the information network. This keynote will address three key themes in this loT evolution, each defining stages in the evolution of the Internet over the next decade. Over the next few years, the importance of collaboratory participation nets will further increase active creation and passive consumption. By 2015, immersive nets become predominant, integration local tags, wireless networks and smart environment's offer a cloud of information accessible and editable both remotely and in-person. After 2017, metaverse nets will take this augmented world and add connections with virtual environments. Although innovative, the risk and disruption to these new architectures will present challenges to the loT Cyber domain needing to address the very large numbers of `things/objects' handing data in this new global information space.
2013 IEEE Third International Conference on Information Science and Technology (ICIST), 2013
ABSTRACT Any communications network is subject to becoming the target of exploitation by criminal... more ABSTRACT Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hacker's attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStreamX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to 'worst case scenario' emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.
International Journal of Computer Science and Information Technology
Society is inextricably dependent on the Internet and other globally interconnected infrastructur... more Society is inextricably dependent on the Internet and other globally interconnected infrastructures used in the provisioning of information services. The growth of information technology (IT) and information systems (IS) over the past decades has created an unprecedented demand for access to information. The implication of wireless mobility are great, and the commercial possibilities of new and innovative wireless flexibility are just beginning to be realized through the emergence of the Internet of Things (IoT). This article takes a look the history of hacking and professionalization of the hacker industry. As the hacker industry becomes more fully professionalized, it is becoming much more adaptive and flexible, making it harder for intelligence and law enforcement to confront. Furthermore, the hacker industry is blurring the distinction between motivated crime and traditional computer security threats - including the disruption of critical infrastructures or the penetration of ne...
Summary form only given. The Internet of Things (IoT) is an integrated part of the future Interne... more Summary form only given. The Internet of Things (IoT) is an integrated part of the future Internet with self-configuring capabilities based on interoperable communication protocols where physical and virtual `things/objects' have identities, physical attributes and are seamlessly integrated into the information network. This keynote will address three key themes in this loT evolution, each defining stages in the evolution of the Internet over the next decade. Over the next few years, the importance of collaboratory participation nets will further increase active creation and passive consumption. By 2015, immersive nets become predominant, integration local tags, wireless networks and smart environment's offer a cloud of information accessible and editable both remotely and in-person. After 2017, metaverse nets will take this augmented world and add connections with virtual environments. Although innovative, the risk and disruption to these new architectures will present challenges to the loT Cyber domain needing to address the very large numbers of `things/objects' handing data in this new global information space.
Uploads
Papers by Tyson Brooks