For the Davis family, ECPI University is a family affair. Mom Wendy is a member of the Network Security faculty and her quadruplets are all students at the university as well. Daughters Victoria and Samantha are studying Criminal Justice and Network Security (respectively) and sons Jake and Tyler are studying Network Security and IT Management (respectively). [Read more...]
By David DeWalt, BS Network Security Management Student, Columbia Campus
Oftentimes you hear about people who join the military for the sole reason of serving their country and being a part of history. That wasn’t my story. I was going to be a father and wanted to provide for my family in a positive way, so I enlisted to do just that. But what started as a young boy determined to find a means to an end, quickly turned into a young man determined to seek excellence from himself and those around him. It was in the Army that I first heard the quote by Carl Rogers that says, “The only person who is educated is the one who has learned how to learn and change.” After hearing this, I decided that if I was nothing else in this life, I would seek a lifestyle of learning. [Read more...]
Many people are intimidated by the current state of the job market. In tough economic times, it’s hard to find jobs that pay well enough to live a comfortable life. Many jobs require an expensive four-year degree before you can even get your foot in the door. However, this is not always the case. Many jobs can be attained with only a two-year degree, and often pay more than several jobs requiring an expensive bachelor’s degree.
(All statistics are from the U.S. Bureau of Labor Statistics Occupational Outlook Handbook)
The need for dental assistants is ever-present, with a projected job growth rate of 25%. These valuable healthcare providers play a crucial role in the day to day operations of a dental office including performing x-rays, caring for patients, assisting dentists during procedures, and performing dental cleanings. Practicing as a dental assistant requires only a two-year associate’s degree, and license from the state you wish to practice in. The median income for dental assistants in 2012 was over $34,500 a year, averaging out at around $16.50 per hour.
Just like dental assistants, the need for registered nurses is high and growing all the time. Registered nurses are employed through the healthcare industry in clinics, hospitals, out-patient care, and doctor’s offices. Working as a registered nurse also provides a variety of duties as well as locations. Registered nurses can be responsible for performing tests, assisting physicians, and providing basic healthcare to patients. Entry into this field requires only a two-year degree, with many employers offering assistance to provide further education after employment. In 2012, people working as registered nurses earned an average income of $65,000.
Charleston Students Create Covert Device, Demonstrate Need for Physical Security in Networked Computing
Most people are familiar with anti-virus software, but what about a threat lurking right under the desk? Well, a group of ECPI University students in Charleston, South Carolina have demonstrated just how simple it is to create an information-stealing covert device that seems like something from a spy novel.
The students embedded a popular miniature computer called a Raspberry Pi into a typical multi-plug power strip to create a device that, once implanted into an office setting, collects data covertly for recovery by the creators. The project required collaboration between Electronics Engineering Technology students, who completed much of the necessary hardware assembly, and Computer Information Science students, who programmed the device to carry out its task.
“Covert devices are very real and prevalent in our technological world,” said Project Manager Wesley Boothe. “These devices can be built with common materials from the internet and deployed in an inconspicuous manner with the purpose of gaining access to internal organizational data.” Appropriately enough, they named the device “The Odysseus,” a nod to the famous myth of the Trojan horse.
ECPI University faculty member Corey Keating recently delivered a presentation at the International Conference on Computing and Missions in Doetinchem, Netherlands. Conference attendees came from all over Europe, with a few coming from the U.S. and Canada. The conference covered all aspects of technology and computing for mission organizations, many of which operate as international companies. The conference theme centered on mobile computing to enhance effective operations.
Mr. Keating’s security presentation focused on Deniable File Systems and was featured in the Advanced Technology Track. “Although encrypting data is a trivial task, the ability to plausibly deny the existence of truly sensitive data, even under the pressure of hostile adversaries, is a very difficult problem from a technological perspective, “says Keating. “I presented various methods and tools to maintain hidden, encrypted data. The methods ranged from fairly simplistic to very sophisticated, based on a person’s risk situation. Due to the potentially incriminating nature of this material to those traveling into hostile parts of the world, my presentation is not being published or made readily available to the public.”