The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

News & Blogs



Cryptographers Have an Ethics Problem (MIT Review)

Mon, September 16, 2013CERIAS Media Citings

Eugene Spafford, executive director of the CERIAS institute at Purdue University and an officer of the ACM, cautioned me against reaching simplistic ethical judgments. He said if a person is hacking computers and stealing messages to prevent a terrorist attack, they’re not necessarily in violation of the society’s code, which allows for “varying interpretations.”





Just sayin

Mon, September 09, 2013General, Secure IT Practices




Prof. Spafford to Keynote ISSA International Conference

Fri, September 06, 2013

The Information Systems Security Association (ISSA) announced today a high-profile line-up of speakers for its fourth annual ISSA International Conference (#ISSAConf) to be held October 9-10 at the Nashville Convention Center in Nashville, TN.



Computer Security History Workshop-Call For Papers

Wed, August 28, 2013Call For Papers

The Charles Babbage Institute (CBI) is conducting a three-year NSF funded research project on computer security, which focuses on the years when the field of “computer security” was just emerging, roughly the late 1960s through the early 1990s with the shift to networked computing and the web. We are “building an infrastructure” for future historical research through conducting 30 oral histories with computer-security pioneers, collecting archival documents, creating a knowledge-networking wiki site, and publishing scholarly work in this field.



Purdue Researchers Working on Missile-Defense Software Purdue Researchers Working on Missile-Defense Software

Tue, August 13, 2013

Purdue University researchers are peering into the future to help the United States foil enemy missile attacks.



Dr. Samuel Liles Discusses Digital Forensics, Cyberweapons

Tue, July 02, 2013

Professor Sam Liles talks about defining data, digital forensics, cyber weapons, potential responses to being hacked, and briefly touch on legal infrastructure underlying computer crime.

TheLoopcast.com


Podcast Powered By Podbean