Methods for analyzing non-quantitative data, understanding crime statistics, writing better prose, using WORD more effectively, starting a new IA course successfully, and taking care of data stored on your hard disks -- among other things!


Home Page

Contact info






InfoSec Perception



NetworkWorld Archive


Ops Mgmt


Security Mgmt

Brute-Force Cracking Estimation      XLS

This little spreadsheet lets you enter the number of positions in a key, the number of values per position, and the number and speed of processors attacking the keyspace. It computes the maximum time required for brute-force cracking of the entire keyspace measured in seconds, hours, days, years or universe-lifetimes.

CAC:  Computer-Aided Consensus (TM)

     PPT 36 MB

     PDF .2 MB

     MP3 10 MB

An easy method using a spreadsheet to improve brainstorming. Takes the insights of the Delphi Method and applies them to live brainstorming sessions. The PPT file is a narrated introduction excerpted from a lecture on leadership techniques originally created for MSIA students; the PDF is a printout of the CAC slides from that talk. The MP3 file is the extracted voice-stream from the original slide presentation.

CATA:  Computer-Aided Thematic Analysis (TM)      PDF

An easy method using a spreadsheet to isolate facts, ideas, opinions and feelings into themes and then organize these themes into a coherent structure without having to impose an extrinsic framework on them.  Useful for all students and researchers.

For a guided tour of the method with voice commentary, click here to download a PPT (PowerPoint) file with narrated slides (~7 MB) and then play the slide show (press F5) with your computer sound enabled.

Checking for Data-Conversion Errors      PDF      XLSX

How can we check to see if files we have modified to correct errors such as extra characters are consistent with the original data and our intentions?

Class List Template      XLSX      XLS

This Excel file can be modified by teachers to track grades in specific courses. Provided in Excel 2007 (XLSX) and Excel 2003-1997 (XLS) formats.

Converting firstname & lastname to < lastname, firstname >      XLSX

Excel file let user convert pasted data that has last name in a column and first name in a separate column (e.g., from Bannerweb advisee listings) into a single field with < lastname, firstname >. Includes simple instructions.

Converting Percentages to Letter Grades      XLSX

Excel file demonstrates the use of a VLOOKUP function to choose correct letter grade (at Norwich University) automatically for any percentage. Details are easy to modify to meet the academic standards of any institution.

Creating GIFT files for Importing Questions/Answers from Excel Into Learning Management Systems      XLSX

The NUoodle (a variant of Moodle) learning management system (LMS) accepts questions in several formats, including GIFT (General Import Format Technology). This spreadsheet provides an easy way to create multiple-choice questions with five answers, check for duplicate answers, keep track of the source for every question, randomize the questions (without answers) to create review sheets, and generate TXT files in GIFT mode for import into the LMS quizzes.

Dramatic Reading: Making Books Come Alive

A guide (PDF) and a narrated lecture (PPTX) about reading books aloud.

Essay-Grading Template      XLSX      PDF

This Excel file can be modified by teachers to record and report on essay grades in specific courses with up to 44 students. It includes suggestions for assigning grades; all of these suggestions can easily be modified. When one has completed the grades for a student, that student's grades and comments can be hidden temporarily. Instructors can print a complete set of reports in a single operation to create a single PDF file that can be printed to generate all the student reports at once (as shown in the PDF file indicated). Using Acrobat, the global PDF can also easily be split into individual PDF files (in a single operation) to provide each student with an individual report file that can be sent by e-mail. Provided in Excel 2010 (XLSX) format.

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition: a Review      PDF

The National Institute of Justice has issued its second edition of this classic guide. Read the review and download the document. It is required reading for all information assurance professionals who could have contact with a crime scene involving computers and networks.

Frequently Corrected Errors      PDF

Iíve been editing technical writing since 1970 and notice that some errors keep popping up in many writersí papers. Iíve been collecting the comments I make about these errors and hope that you will find some of them helpful. Several colleagues and students have contributed suggestions that I have gratefully incorporated and acknowledged in the file. Using the excellent macro facility KEYTEXT3, I routinely update macros for much-used corrections that I put in comments when editing students' (or others') writing. For example, instead of having to write out a comment explaining "indefinite antecedent for pronominal adjective", I just type =ia= and KEYTEXT3 instantly posts a paragraph of explanation with examples.See the file fce_macros.pdf for examples of some of the macros I use.

Guide to Online Research

Discusses search engines, operators, open-access journal databases, checking the credibility of sources, citation, and avoiding plagiarism. Link contributed by Sandra Beals.

How to Find Courses That Have Already Been Approved for Transfer into Norwich     PDF

Students often need to locate courses for transferring credit into their Norwich University transcript. This simple guide shows them how.

Heuristic Analysis of Test Questions    XLSX

When an instructor creates a test with many questions, it can be useful to determine if any of the questions have a low, zero or negative correlation with the overall score. For example, do high-scoring responders tend to do poorly on particular questions? Do low-scoring responders tend to do well on particular questions? Any such suspect partial correlation warrants examination of the questions that are outliers. Are they ambiguous? Do high-scorers see subtleties in the question that lead them to an answer different from what the tester expected? The XLSX file provided here uses a simple correlation matrix without tests of statistical significance as a simple heuristic to direct attention to peculiar questions that warrant further attention.

Instructional Resources for New IA Instructors      PDF

New instructors starting to teach information assurance (IA) courses can face a major challenge, especially if no one has taught such courses in their institution. This paper reviews the Computer Security Handbook (CSH) designed for two undergraduate courses, Introduction to IA and Management of IA in a baccalaureate degree in information assurance or for the foundational courses of a Master’s degree in information assurance. Resources are freely available to all IA instructors from long-time IA teacher M. E. Kabay. Resources include
• Course descriptions
• Syllabuses
• Extensive PowerPoint slide sets
• Teaching platform design
• Sample memo-type exam questions
• Over 1500 multiple-choice questions
• Recommendations on use of Moodle and Facebook for teaching.

Kreitzberg Library Databases     PDF

Here are a few simple instructions -- with screenshots -- of how Norwich University students can use the research databases licensed by the Kreitzberg Library.

Model Paper      PDF

Gary Tagg's excellent 6,000 word chapter on Insider Crime from the Computer Security Handbook, 6th Edition, serves as a superb model for students to study as they prepare their own "term papers" or "project reports."

On Writing      PDF

I have compiled some essays about writing (originally posted on the Norwich University MSIA Graduate Portal) into this document and hope that all students will find the ideas and resources interesting, stimulating and useful.

Organizing and Safeguarding Information on Disk       PDF

How can you organize information on your hard disk and on your desktop for easy retrieval? What are some easy steps you can take to safeguard your precious information against accidents? This paper has lots of screen shots from a system using Windows 10 to illustrate simple principles that can help you manage your computer files and programs.

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations (USDOJ)     PDF

Computer Crime and Intellectual Property Section, Criminal Division -- United States Department of Justice (July 2002). This publication is available from the DOJ Cybercrime site in HTML. I have produced a PDF of this public-domain text and added a set of bookmarks to correspond to most of the table of contents links in the original Web version of the document.

SQ3R (method for organized study and learning)      PDF

Reading assigned materials a few times does not work as a method for integrating knowledge. Try Survey-Question-Read-Recite-Review (SQ3R), a method long-established as an excellent way to tackle new written information.

Tips for Using MS-WORD Effectively v10     PDF

This evolving document lists some useful tips for using WORD as more than the electronic equivalent of a typewriter. Topics include autosave, spell-checker, grammar-checker, paragraph spacing, autotext, autocorrect, keyboard macros, bookmarks, special characters, defeating automatic formatting, automatic bullets and numbers, columns, working with bibliographic references, footnotes or endnotes, cross-referencing footnotes, headings, document map, outline view, outlining toolbar, creating tables from text, autoformatting tables, managing tables, styles, tracking changes, pictures, using macros when editing, design options, and creating and updating a table of contents and an index. Updated January 2016.

Tips for Using MS-PowerPoint Effectively     PPTX     PDF

A guided tour for beginners learning PowerPoint. Brings to light many features that can save beginners time and reduce pain. First version produced January 2016 for CS120 course.

TODO Database Format      MDB

Empty MS-Access database showing the format I used for many years in keeping track of projects and priorities. The TASKS function in Outlook provides a useful substitute that I have been using in later years.

Tracking Changes in MS-Word 2003     PPT

Many new users of Word are mystified by Track Changes. This PPT file demonstrates how to use the feature in MS Word 2003. The functions are similar in Word 2007 even though the user interface has changed.

Understanding Computer Crime Studies and Statistics v7         PDF

Why one should be careful not to over-interpret published surveys and studies of crimes, especially computers crimes; and how to make sense of sampling, sample sizes, confidence intervals and contingency tables. Updated December 2008 with new material on confounded variables and in June 2009 with minor updates. A brief description of meta-analysis was added in January 2013. This paper is the basis for the corresponding chapter in the Computer Security Handbook (4th, 5th, 6th editions).

Using Outlook or Excel to Create a Weekly Course Schedule         PPTX

I was asked to show students (or anyone else) how to use Excel to create a calendar. I added instructions for Outlook as well. This is a narrated PowerPoint file with screenshots. Press function key F5 to start the show after you download and open the file.

Writing-Related Resources -- from Dan Swanson

Dan Swanson has been writing and editing technical articles for decades. Here is his extensive collection of useful resources (posted with permission).

Copyright © 2022 M. E. Kabay.  All rights reserved.

The opinions expressed in any of the writings on this Web site represent the authorís opinions and do not necessarily represent the opinions or positions of his employers, associates, colleagues, students, relatives, friends, enemies, cats, dog or plants. Materials copyrighted by M. E. Kabay from this Website may be freely used for non-commercial teaching (i.e., specifically in any courses for academic credit or in free industry training at workshops or within organizations) but may not be re-posted on any Website or used in commercial training (where participants must pay fees for participation in the conference or workshop or where the instructor is paid) without express written permission. Any unauthorized sale of these copyrighted materials will be prosecuted to the full extent of the law.