College of Engineering and Computing, Department of Information Technology
Professor Katz's Scholarly Activities
My area of interest is Information and Cyber Security.
Presentations at Conferences:
- "The
Effect of a University Information Security
Survey on Instruction Methods in Information
Security," presented at
the 2005
Information Security Curriculum Development
Conference (InfoSecCD 2005), September
23-24, 2005, Kennesaw State University,
Kennesaw, GA.
- "The Correlation Between Success in Pre-Calculus
and Java Programming Among CS and IT Majors
in the School of Computing at AASU," presented
at the 11th Annual Math-Technology Conference, February
24, 2006, Valdosta State University, Valdosta,
GA.
- "The
Effect of a University Information Security
Survey on the Pedagogy of Information Security,"
presented at the Sixth Annual Symposium
on Teaching and Learning, March 31,
2006, Armstrong Atlantic State University.
- "Campus-wide
Spyware and Virus Removal as Method of Teaching
Information Security," presented at
the 2006
Information Security Curriculum Development
Conference (InfoSecCD 2006), September
22-23, 2006, Kennesaw State University,
Kennesaw, GA.
- "Integrating
a Security Awareness Program Into an Information
Secuity Course," presented at the 2007
21st Annual Consortium for Computing Sciences
in Colleges Southeastern Conference (CCSC:SE
2007), November 9-10, 2007, Coastal Carolina
University, Myrtle Beach, SC.
- "Avian
Flu: The Use of IT to Mitigate a Pandemic
and its Effects on Information Security,"
presented at the 2008 2nd Annual Computer
Security Conference (CSC 2008), April
16-18, 2008, Coastal Carolina University,
Myrtle Beach, SC.
- "Acceptable Use Policies
as a Defense Against Threats Posed by the Use of Social Networking Sites in
Organizations"presented at the 2009 3nd Annual Computer
Security Conference (CSC 2009), March
25-27, 2009, Coastal Carolina University,
Myrtle Beach, SC.
- " WPA vs. WPA2: Is WPA2 Really an Improvement on WPA?" presented at the 2010 4th Annual Computer
Security Conference (CSC 2010), April 15-16, 2010, Coastal Carolina University,
Myrtle Beach, SC.
- "Curriculum and Pedagogical Effects of Creation of a Minor in Cyber Security," presented at the 2010 Information Security Curriculum Development Conference (InfoSecCD 2010), October 1-2, 2010, Kennesaw State University, Kennesaw, GA.
- "The Creation of a Minor in Cyber Security - the Sequel" presented at the 2012 Information Security Curriculum Development Conference (InfoSecCD 2012), October 5-6, 2012, Kennesaw State University, Kennesaw, GA.
- "Measuring the Effectiveness of Instruction Based on a Hands-On Workshop in Information Assurance," presented at the 2013 Information Security Curriculum Development Conference (InfoSecCD 2013), October 11-12, 2013, Kennesaw State University, Kennesaw, GA.
- "BYOD Policies in Practice", from a WebBSIT Grant, presented at the CS/IT Research Symposium on October 25, 2013, at Armstrong Atlantic State University.
- "A Comparison of Different Methods of Instruction in Cryptography" presented at the 2014 Information Security Curriculum Development Conference (InfoSecCD 2014), October 11, 2014, Kennesaw State University, Kennesaw, GA.
- "A Comparison of Different Methods of Instruction in Cryptography", from a WebBSIT Grant, presented at the CS/IT Research Symposium on November 7, 2014
- "Teaching Cryptography Using Calculative, Client-Based, and Virtual Methods, a Nifty Assignment", presented at the 30th Annual Consortium for Computing Sciences in Colleges Southeastern Conference (CCSC:SE 2016), November 4-5, 2016, UNC-Asheville, Asheville, NC
- "Cyber Course Curriculum Development", presented at the Southeast Cybersecurity Conference (SECC), July 26-27, 2018, Orlando, FL
- "Adversarial Thinking: Teaching Students to Think Like a Hacker" published in the Proceedings of the 3rd Annual Conference on Cybersecurity Education, Research, and Practice, Kennesaw State University, October 12, 2019
- "Resilience vs Prevention, which is the Better Cybersecurity Practice?" published in the Proceedings of the 5th Annual Conference on Cyberesecurity Education, Research, and Practice Kennesaw State University, October 30, 2021
Published Papers:
- "The
Effect of a University Information Security
Survey on Instruction Methods in Information
Security," published
in The Digital Library of the ACM, Proceedings
of the 2nd annual conference on Information
Security Curriculum Development, InfoSecCD 05,
Kennesaw State University, September 23, 2005.
- "Campus-wide Spyware and Virus Removal as a Method of Teaching Information Security," published
in The Digital Library of the ACM, Proceedings
of the 3rd annual conference on Information
Security Curriculum Development, InfoSecCD 06,
Kennesaw State University, September 22, 2006.
- "Integrating
a Security Awareness Program Into an Information
Security Course," published in The
Journal of Computing Sciences in Colleges,
Papers of the Twenty-First Annual CCSC Southeastern
Conference (a refereed paper). This paper
was also published in the Digital Library
of the ACM.
- "Avian
Flu: The Use of IT to Mitigate a Pandemic
and its Effects on Information Security,"
presented at the 2008 2nd Annual Computer
Security Conference (CSC 2008), April
16-18, 2008, Coastal Carolina University,
Myrtle Beach, SC.
- "Acceptable Use Policies
as a Defense Against Threats Posed by the Use of Social Networking Sites in
Organizations"presented at the 2009 3nd Annual Computer
Security Conference (CSC 2009), March
25-27, 2009, Coastal Carolina University,
Myrtle Beach, SC.
- "WPA vs. WPA2: Is WPA2 Really an Improvement on WPA?" presented at the 2010 4th Annual Computer
Security Conference (CSC 2010), April 15-16, 2010, Coastal Carolina University,
Myrtle Beach, SC.
- "Curriculum and Pedagogical Effects of Creation of a Minor in Cyber Security," published in the Digital Library of the ACM, Proceedings of the 7th annual conference on Information Security Curriculum Development, InfoSecCD 10, Kennesaw State University, October 2, 2010.
- "A Comparison of Tablet Computers for Use as a Class Presentation Platform," with Dr. Thomas Murphy and Mr. Chris Williams, both of Armstrong Atlantic State University, published in the preceedings of the 2012 ASEE Southeast Section Conference
- "The Creation of a Minor in Cyber Security - the Sequel," published in the Digital Library of the ACM, Proceedings of the 9th annual conference on Information Security Curriculum Development, InfoSecCD 12, Kennesaw State University, October 6, 2012.
- "Measuring the Effectiveness of Instruction Based on Material From a Hands-On Workshop in Information Assurance," published in The Digital Libarary of the ACM, Proceedings of the 10th Annual Conference on Information Security Curriculum Development, InfoSecCD 13, Kennesaw State University, October 11-12, 2013
- "A Comparison of Different Methods of Instruction in Cryptography," published in The Digital Libarary of the ACM, Proceedings of the 11th Annual Conference on Information Security Curriculum Development, InfoSecCD 14, Kennesaw State University, October 11, 2014
- "Breadth vs. Depth: Best Practices Teaching Cybersecurity in a Small Public University Sharing Models" published in the Summer 2018 edition of the Cyber Defense Review of the Army Cyber Institute at West Point
- "Adversarial Thinking: Teaching Students to Think Like a Hacker" published in the Proceedings of the 3rd Annual Conference on Cybersecurity Education, Research, and Practice, Kennesaw State University, October 12, 2019
- "Resilience vs. Prevention, which is the Better Cybersecurity Practice" published in the Proceedings of the 5th Annual Confrerence on Cybersecurity Education, Research, and Practice, Kennesaw State University, October 30, 2021
Grants:
- "Campus-Wide Spyware and Virus Removal as a Method of
Teaching Information Security." AASU Teaching and Learning Grant, Grant Period January
1, 2006 to June 30, 2006. Approved November 14, 2005.
- NSF-SFS Summer Workshop on Information Assurance at the University of Chattanooga, $2000 grant from the National Science Foundation to attend this workshop. See below for more information.
- WebBSIT Grant for Research, Summer 2013. Topic: BYOD Policies in Practice
- WebBSIT Grant for Research, Summer 2014. Topic: Different Methods of Instruction in Cryptography
- DoD CySP Grant (Scholarship, Pay, Travel, etc), 2020-2021 Awarding Agency: NSA on behalf of DoD, as Primary Investigator. $148,346.00, October 02, 2020
- DoD CySP Grant (Scholarship, Pay, Travel, etc), 2021-2022 Awarding Agency: NSA on behalf of DoD, as Primary Investigator. $53,988.00, September 09, 2021
Lectures and Interviews:
- "Keeping Kids Safe on
the Internet," presented to the PTO of the Rambam Day School, Savannah, GA,
May, 2006
- "Bird
Flu's Potential Effects on Business and
Information Technology," as part of the Robert
Ingram Strozier Faculty Lecture Series faculty
lecture "Are We Prepared for Pandemic Bird
Flu?", Armstrong Atlantic State University,
October 20, 2006
- "Staying Safe on the Internet," presented to the weekly Senior
Citizens Luncheon of the Jewish Educational Alliance (JEA), Savannah, GA, April 25, 2013.
- Interviewed by WSAV's JoAnn Merrigan on Cyber Security, May 21, 2013. The link to the article and video follow:
Article - Cyber Crime is growing, are you protected?
- Interviewed by WSAV's Greg Gullberg on protecting children and teens online, in Social Media, on March 11, 2014. The link to the video follows:
Protect your children and teens on social media
- Interview by WSAV's JoAnn Merrigan on Target's use of Chip-and-PIN technology for their RED Card, how secure it is, and how it will affect overall consumer security. The link to the clip below is a "teaser" for the longer interview that was aired at 6pm on May 6. The interview was conducted at ASU on May 6, 2014, and shown that evening. Another segment of the same interview, regarding the security of BitCoins, was aired on May 7, 2014. The link to the teaser is below:
How secure is chip-and-PIN technology and is it the wave of the future?
- "Staying Safe on the Internet," presented to the Kiwanis Club of The Landings, The Landings at Skidaway Island, Savannah, GA, May 22, 2014
- Interviewed by WSAV's JoAnn Merrigan on President Obama's Cyber Security proposal on January 14, 2015. The link to the video follows:
Interview on President Obama's Cyber Security Proposal
- Interviewed by WSAV's JoAnn Merrigan on Net Neutrality on February 10, 2015. The link to the "teaser" for the longer segment follows:
Interview on Net Neutrality. Here is the link to the actual article on WSAV's site that includes the "teaser" for the longer segment - the text contains my responses in the interview: Article including responses and "teaser" segment
- Interviewed by WSAV's JoAnn Merrigan on Anthem Insurance security breach on March 2, 2015. The link to the article and video follows:
Interview on Anthem Security Breach
- "Happy Tax Day: Is Your Data Still Secure?" presented as part of the College of Science and Technology's Science on Tap Lecture Series at the Savannah Coffee Roasters, April 15, 2015.
- Interviewed by WTOC's Elizabeth Rawlins on Chrysler/Jeep cars being vulnerable to Cyber Hacking on August 6, 2015. The link to the article an video follows:
Interview on cars being vulnerable to Cyber Attack
- Interviewed by WTOC's Elizabeth Rawlins (continuation of 8/6/15 interview) on Cyber Security curriculum at ASU, broadcast on Sunday, August 9, 2015, follows:
Second part of 8/6/15 interview, this on ASU's Cyber Security Curriculum
- Participated in TAG-sponsored Panel Discussion at DIRTT on Privacy vs Secuirty: Local Experts Weigh in on Apple vs. FBI, panel discussion on Tuesday, April 26, 2016, and broadcast on WSAV on Wednesday, April 27, 2016. Panel Discusson: Privacy vs Security, telecast by WSAV
- Interviewed by WSAV's JoAnn Merrigan on Privacy vs Security, the FBI vs Apple. Interview on Wednesday, April 27, 2016, broadcast on Tuesday, May 3, 2016. Interview on Privacy vs Security
- Interviewed by WSAV on Privacy and Security of Covid-19 apps. Interview on Friday, August 28, 2020, broadcast on the same day Interview on Covid-19 apps
- Interviewed by WTOC on the Army Cyber Institute's Jack Voltaic 3.0 Cyber Exercise. Interview on Thursday, September 24, broadcast on the same day Interview on Jack Voltaic 3.0, WTOC
- Interviewed by WSAV on the Army Cyber Institute's Jack Voltaic 3.0 Cyber Exercise. Interview on Thursday, September 24, broadcast on the same day - video Interview on Jack Voltaic 3.0 - WSAV, video
- Interviewed by WSAV on the Army Cyber Institute's Jack Voltaic 3.0 Cyber Exercise. Interview on Thursday, September 23, broadcast on the same day - no video, just story Interview on Jack Voltaic 3.0 - WSAV, just story
- Interviewed by WSAV on the Colonial Pipeline Hack. Interview on Friday, June 18, 2021 WSAV Interview on Colonial Pipeline Hack
- Associated Press Story on Colonial Pipeline Hack, dated June 21, 2021 AP story including my interview on WSAV no video
- Local Fox28 News Story on Colonial Pipeline Hack, dated June 22, 2021 Fox 28 interview no video
- Interviewed by WSAV on the effect of Russian hackers on US Cybersecurity resulting from the war in Ukraine, dated February 28 (aired March 3), 2022 Interview on Cybersecurity effects of Ukrainian war
- Interviewed by Georgia Southern University's "Eagle Eye View Podcast" on Cybersecurity during Cybersecurity Month, October 12, 2022, Eagle Eye View Podcast
Conferences, Workshops and Other Symposia attended:
- Faculty Development Workshop
on Teaching Information Security,
Center for Information Security Education,
Kennesaw State University, December 16 – 18,
2006, This workshop concentrated on various
successful methods of teaching an introductory
course in Information Security.
- NSF-SFS Summer Workshop on Information Assurance at the University of Chattanooga, sponosored and funded by the National Science Foundation from May 21 - 25, 2012. This five-day workshop concentrated on various hands-on labs and methods of teaching Information Assurance. Included in the curriculum were: Cryptography, Access Control, Security Management, Wireless Security, Firewall exercises, Guided Web Hacking, Secure Web Development, Forensics, and Ethics.
- Desire-2-Learn Regional Workshop on Best Practices, at Valdosta State University, February 20 and 21, 2013.
- 51st ACM Southeast Regional Conference, Coastal Georgia Center, Savannah, hosted by AASU, April 4 – 6, 2013: member of the Program Committee
- New Models, MOOCs and Beyond, at the Georgia Institute of Technology, November 6, 2013.
- American Council on Education (ACE) Workshop on ACE credit for Workforce Training and ACE Military Training, at the Georgia Institute of Technology, April 11, 2014
- Cyber Education Summit, at Georgia Regents University, October 23, 2014
- Technology Association of Georgia (TAG) 2015 Cybersecurity Attack Simulation, at Southern Polytechnic State University (of Kennesaw State University), May 5, 2015.
- 2nd Annual Cyber Education Summit, at Georgia Regents University, October 15, 2015
- 2015 NSA-CAE (Center of Academic Excellence) Community Meeting Conference, at San Diego, CA, November 2, 2015
- 2015 NIST-NICE (National Institute of Standards & Technology - National Initiative for Cybersecurity Education Conference, at San Diego, CA, November 3-4, 2015
- Spring 2016 Army Cyber Talks, sponsored by the US Army Cyber Institute (ACI) of the United States Military Academy at West Point, at Georgia Tech, Atlanta, March 29, 2016
- 2016 National Cyber Summit and NSA-CAE Community Meeting, at Huntsville, AL, June 7-9, 2016. It is at this meeting that Armstrong was presented with its Certificate of NSA-CAE/CD designation.
- 2017 National Cyber Summit and NSA-CAE Community Meeting, at Huntsville, AL, June 5-7, 2017.
- 2017 Conference on Cybersecurity Education, Research, and Practice (CCERP), at Kennesaw State University, October 20-21
- 2018 National Cyber Summit and NSA-CAE Community Meeting, at Huntsville, AL, June 5-7, 2018.
- 2018 Southeast Cybersecurity Conference (SECC), sponsored by the University of West Florida - NSA-CAE SE Regional Center, at Orlando, FL, July 26-27, 2018.
- 2018 Conference on Cybersecurity Education, Research, and Practice (CCERP), at Kennesaw State University, October 19-20
- 2018 Fall NSA-CAE Symposium and CAE Meeting, at Miami, FL, November 8-9
- 2019 SEED (Security Education) Workshop, at Syracuse University, Syracuse, NY, June 3 - 6
- 2019 SE Region of NSA-CAE Conference and Workshop, at the University of West Florida, Pensacola, FL, Sept 10 - 13
- 2019 NICE Conference and Expo, Phoenix, AZ, November 19-20
- 2019 NSA-CAE Symposium and CAE Meeting, Phoenix, AZ, November 21-22
- 2020 AFCEA CERTS Conference, Augusta, GA, January 14-16
- "Securing Research at Georgia Southern University" presented as a member of a panel at the 2022 Securing Higher Education Research
in Georgia Conference, Georgia Cyber Center, Augusta, GA, March 10, 2022
- 2022 AFCEA CERTS Conference, Augusta, GA, May 9 - 11, 2022
- 2022 NICE Conference and Expo Atlanta, GA, June 6 - 8, 2022
- 2022 NSA-CAE Symposium and CAE Meeting, Atlanta, GA, June 7 - 9, 2022. Attended as Georgia Southern's Point of Contact for the NSA-CAE program
- 2022 NSA-CAE Southeast Regional Meeting, University of North Carolina, Charlotte, Charlotte, NC, September 28 - 29, 2022. Attended as
Georgia Southern's Point of Contact for the NSA-CAE program