Ronald E. McNair Internship Experience By: Lemonteh’ Horne.

Slides:



Advertisements
Similar presentations
Successful strategies for improving outcomes through quality assessment and evaluation of programs Leadership Conference Winston Salem, NC June
Advertisements

© 2012 Association for Computing Machinery Intro to the ACM Digital Library February 24, 2012 Intro to the ACM Digital Library February 24, 2012.
DRIVER Building a worldwide scientific data repository infrastructure in support of scholarly communication 1 JISC/CNI Conference, Belfast, July.
SHELLY POTTS, PH.D. UNIVERSITY OFFICE OF EVALUATION AND EDUCATIONAL EFFECTIVENESS ARIZONA STATE UNIVERSITY Quality Assurance Mechanisms.
1 WeCAN Works Presentation Monday, December 14, 2009.
Implementation of the CoP in SLOVENIA Cooperation with data users Genovefa RUŽIĆ Deputy Director-General.
Assessing and Developing Skills for the Workplace Chapter 2.
Loading. ######################################################## # Welcome ! # # # We are the # # Internet Defense Council.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Intrusion detection Anomaly detection models: compare a user’s normal behavior statistically to parameters of the current session, in order to find significant.
11 MONITORING MICROSOFT WINDOWS SERVER 2003 Chapter 3.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Sarah Thompson, E-Mentoring Coordinator Protégé Mentorship Program Orientation.
Design and Implementation of SIP-aware DDoS Attack Detection System.
ANDREW ZIELINSKI, MBA
Yiangos Ktorides Cyprus Computer Society Computer Science at the Primary and Secondary Schools of Cyprus.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
© 2008, Renesas Technology America, Inc., All Rights Reserved 1 Introduction Purpose  This training course provides an overview of the installation and.
IIT Indore © Neminah Hubballi
FAMU Enterprise Information Technology E-Commerce Division By: Kenya Farmer.
Graduate Research School (GRS) Nicky Solomon Dean Graduate Research School THINK.CHANGE.DO.
ELMONT UFSD INTEGRATING LITERACY & SOCIAL STUDIES “A FRAMEWORK FOR SUCCESS” SUPERINTENDENT AL HARPER.
How eNet4S can benefit your project? eNet4S Software Solution Business Team Chief Technology Officer July 11, 2006.
Operating system Security By Murtaza K. Madraswala.
D1.HGE.CL7.01 D1.HGA.CL6.08 Slide 1. Introduction Design, prepare and present reports  Classroom schedule  Trainer contact details  Assessments  Resources:
WHAT YOU SHOULD EXPECT FROM YOUR EVALUATOR: PROMISING PRACTICAL PRACTICES July 28, 2011 Hi-TEC Conference, San Francisco.
The Leadership Academy is a place where leaders, and those in leadership positions, can learn the latest thinking in educational leadership from some.
Kittiphan Techakittiroj (25/10/58 12:06 น. 25/10/58 12:06 น. 25/10/58 12:06 น.) Intrusion Detection System Kittiphan Techakittiroj
ECE 396 – Senior Design I Fall 2015 Semester Lecture 1 Introduction to Senior Design.
On Demand Business © 2004 IBM Corporation Certification and Accreditation Sandra Jolla, Program Manager June 14, /10/04 IBM Certified for e-business.
Serve the Professional, Advance the Profession SHRM Student Member Benefits Presented by SHRM Student Programs Updated April 2007.
1 Chapter 9 Intruders. 2 Outline Intruders –Intrusion Techniques –Password Protection –Password Selection Strategies –Intrusion Detection Statistical.
IEARN A “How To” Manual. Implementation Three easy steps to Implementation 1. Pick a Project 2. Use your imagination 3. Go to it!
Biometric Technologies
AUDIT SOFTWARE Chapter 16. Generalized Audit Software Off-the-shelf software that provides a means to gain access to and manipulate data maintained on.
Chapter 9 Intruders.
Louisiana Tech Capstone Submitted by Capstone 2010 Cyber Security Situational Awareness System.
Role of a Systems Analysts Business problem solving using information technology Bridges the gap between IT users and systems professionals –In-house software.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
Introduction to Operating Systems Prepared by: Dhason Operating Systems.
By:miguel iturrade.  A computer network is a group of computers that are connected to each other for the purpose of communication.
Keystroke Dynamics By Hafez Barghouthi.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
Ronald E. McNair Research Internship By: Peterson Dierivot By: Peterson Dierivot.
The Bachelor of Science in Information Technology (BSIT) program prepares students to be IT professionals who are able to perform installation, operation,
Standards-Based Online Professional Development to Mentor and Retain Special Education Personnel Presented to Teacher Education Division of Council for.
Creating Meaningful Experiences for Graduate Students Using the ACPA & NASPA Professional Competencies Brett Bruner Director of Persistence & Retention.
Teacher Licensure PI-34 Wisconsin’s New Process. New License Stages  Initial Educator 5 year, non-renewable  Professional Educator 5 year renewable.
© 2002 IBM Corporation Choose your own open-source Adventure ~ SE CS130 UCLA SPRING 2016 ~ Project Lead: Gergana Markova
These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (
Profiling: What is it? Notes and reflections on profiling and how it could be used in process mining.
Greenbush Teacher/ School Specialist Mentoring Model
Chapter 9 Intruders.
Supplemental Instruction at Georgia College
Test Roles and Independence of Testing
Access control techniques
Success in Graduate Study: Customize Your Education
Operating system Security
Kuchimanchi Lakshmi Prasanna
Introduction to Operating Systems
HoD & Project Coordinator
ASCUE 51ST Annual Conference June 2018
New Statewide Accountability System
Project 7: Modeling Social Network Structures and their Dynamic Evolutions with User- Generated Data from IoT REU Student: Emma Ambrosini Graduate mentors:
Types of CAATs Session 3.
Chapter 9 Intruders.
Chapter 9 Transforming Professional Practice
Overview of Computer system
Presentation transcript:

Ronald E. McNair Internship Experience By: Lemonteh’ Horne

Overview  Program History  Program Information  Research Project  Professional Growth  Questions

Program History  Created in the Higher Education Amendments of  A memorial to Dr. Ronald E. McNair  Established to increase numbers of underreprested students in graduate school.

Program Information  Geared toward exposing scholars to graduate school environment.  Scholars selected mentors -Content Experts  Scholars Attended Classes: a. Analytical and Communication Skills b. Statistics c. Educational Technology  Graduate School Sessions: a. Graduate School Environment b. GRE Test Preparation c. Presentation Skills

Research Project Biometrics Security -Examined area of behavioral characteristic. a. Keystroke Dynamics 1. Latency -Research sought to strengthen user verification a. Examined user profile. b.Analyzed data to detected possible intrusion.

Research Project (cont’d.) Biometric Security  Project Purpose: help network administrators examine each login profile and verify legitimate users from non-legitimate users  Primary Method: to identify the abnormal typing pattern from the normal ones.  Tools: C program, PC, SPSS (statistical software) utilizing 65 and 90 percent confidence intervals.

Program Design  Program used in the research was in the C programming language. a. calculated timing of every character typed in password  Program created a log file a. contained all user information during execution

Project Deliverables  Mentor/Mentee Biography  Project Abstract  Introduction/Hypothesis/Methodology  Results/References  Discussion  Charts/Tables/Graphs

Project Timeline  Program lasted from May 8 th to June 12 th.  Last week in July dedicated to revisions of journal article.  SAEOPP/UTK McNair Scholars National Conference a. July 6 th – July 9 th b. Location: Knoxville, TN

Professional Growth  Knowledge in development of Biometric security applications.  Strengthen Writing Skills  Knowledge in research depth  Overcoming technical shortcoming.

Questions???