Methods for analyzing non-quantitative data, understanding crime statistics, writing better prose, using WORD more effectively, starting a new IA course successfully, and taking care of data stored on your hard disks -- among other things!
Brute-Force Cracking Estimation XLS
This little spreadsheet lets you enter the number of positions in a key, the number of values per position, and the number and speed of processors attacking the keyspace. It computes the maximum time required for brute-force cracking of the entire keyspace measured in seconds, hours, days, years or universe-lifetimes.
CAC: Computer-Aided Consensus (TM)
PPT (ZIP) 30 MB
PDF .2 MB
MP3 10 MB
An easy method using a spreadsheet to improve brainstorming. Takes the insights of the Delphi Method and applies them to live brainstorming sessions. The PPT file is a narrated introduction (in a WinZip archive) excerpted from a lecture on leadership techniques originally created for MSIA students; the PDF is a printout of the slides from that talk. The MP3 file is the extracted voice-stream from the slide presentation.
CATA: Computer-Aided Thematic Analysis (TM) PDF
An easy method using a spreadsheet to isolate facts, ideas, opinions and feelings into themes and then organize these themes into a coherent structure without having to impose an extrinsic framework on them. Useful for all students and researchers.
For a guided tour of the method with voice commentary, click here to download a PPT (PowerPoint) file with narrated slides (~7 MB) and then play the slide show (press F5) with your computer sound enabled.
How can we check to see if files we have modified to correct errors such as extra characters are consistent with the original data and our intentions?
This Excel file can be modified by teachers to track grades in specific courses. Provided in Excel 2007 (XLSX) and Excel 2003-1997 (XLS) formats.
Converting firstname & lastname to < lastname, firstname > XLSX
Excel file let user convert pasted data that has last name in a column and first name in a separate column (e.g., from Bannerweb advisee listings) into a single field with < lastname, firstname >. Includes simple instructions.
Converting Percentages to Letter Grades XLSX
Excel file demonstrates the use of a VLOOKUP function to choose correct letter grade (at Norwich University) automatically for any percentage. Details are easy to modify to meet the academic standards of any institution.
Creating GIFT files for Importing Questions/Answers from Excel Into Learning Management Systems XLSX
The NUoodle (a variant of Moodle) learning management system (LMS) accepts questions in several formats, including GIFT (General Import Format Technology). This spreadsheet provides an easy way to create multiple-choice questions with five answers, check for duplicate answers, keep track of the source for every question, randomize the questions (without answers) to create review sheets, and generate TXT files in GIFT mode for import into the LMS quizzes.
Dramatic Reading: Making Books Come Alive
This Excel file can be modified by teachers to record and report on essay grades in specific courses with up to 44 students. It includes suggestions for assigning grades; all of these suggestions can easily be modified. When one has completed the grades for a student, that student's grades and comments can be hidden temporarily. Instructors can print a complete set of reports in a single operation to create a single PDF file that can be printed to generate all the student reports at once (as shown in the PDF file indicated). Using Acrobat, the global PDF can also easily be split into individual PDF files (in a single operation) to provide each student with an individual report file that can be sent by e-mail. Provided in Excel 2010 (XLSX) format.
Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition: a Review PDF
The National Institute of Justice has issued its second edition of this classic guide. Read the review and download the document. It is required reading for all information assurance professionals who could have contact with a crime scene involving computers and networks.
Frequently Corrected Errors PDF
Iíve been editing technical writing since 1970 and notice that some
errors keep popping up in many writersí papers. Iíve been collecting
the comments I make about these errors and hope that you will find some
of them helpful. Several colleagues and students have contributed
suggestions that I have gratefully incorporated and acknowledged in
Several colleagues and students have contributed suggestions that I have gratefully incorporated and acknowledged in the file.Using the excellent macro facility KEYTEXT3, I routinely update macros for much-used corrections that I put in comments when editing students' (or others') writing. For example, instead of having to write out a comment explaining "indefinite antecedent for pronominal adjective", I just type =ia= and KEYTEXT3 instantly posts a paragraph of explanation with examples.See the file fce_macros.pdf for examples of some of the macros I use.
Discusses search engines, operators, open-access journal databases, checking the credibility of sources, citation, and avoiding plagiarism. Link contributed by Sandra Beals.
How to Find Courses That Have Already Been Approved for Transfer into Norwich PDF
Students often need to locate courses for transferring credit into their Norwich University transcript. This simple guide shows them how.
Heuristic Analysis of Test Questions XLSX
When an instructor creates a test with many questions, it can be useful to determine if any of the questions have a low, zero or negative correlation with the overall score. For example, do high-scoring responders tend to do poorly on particular questions? Do low-scoring responders tend to do well on particular questions? Any such suspect partial correlation warrants examination of the questions that are outliers. Are they ambiguous? Do high-scorers see subtleties in the question that lead them to an answer different from what the tester expected? The XLSX file provided here uses a simple correlation matrix without tests of statistical significance as a simple heuristic to direct attention to peculiar questions that warrant further attention.
Instructional Resources for New IA Instructors PDF
New instructors starting to teach information assurance (IA) courses can face a major challenge, especially if no one has taught such courses in their institution. This paper reviews the Computer Security Handbook (CSH) designed for two undergraduate courses, Introduction to IA and Management of IA in a baccalaureate degree in information assurance or for the foundational courses of a Master’s degree in information assurance. Resources are freely available to all IA instructors from long-time IA teacher M. E. Kabay. Resources include
Kreitzberg Library Databases PDF
Here are a few simple instructions -- with screenshots -- of how Norwich University students can use the research databases licensed by the Kreitzberg Library.
Model Paper PDF
Gary Tagg's excellent 6,000 word chapter on Insider Crime from the Computer Security Handbook, 6th Edition, serves as a superb model for students to study as they prepare their own "term papers" or "project reports."
On Writing PDF
I have compiled some essays about writing (originally posted on the Norwich University MSIA Graduate Portal) into this document and hope that all students will find the ideas and resources interesting, stimulating and useful.
Organizing and Safeguarding Information on Disk PDF
How can you organize information on your hard disk and on your desktop for easy retrieval? What are some easy steps you can take to safeguard your precious information against accidents? This paper has lots of screen shots from a system using Windows 10 to illustrate simple principles that can help you manage your computer files and programs.
Searching and Seizing Computers and Obtaining Electronic Evidence
in Criminal Investigations (USDOJ) PDF