Trident University International


Posted by Dr. Pietro Savo on Apr 20, 2016 9:11:41 AM

515X285_airandmarine.jpgToday, we are indeed all linked to each other by the Internet; we are using smartphones, tablets, laptops, and desktop computers. The Internet and digital data sharing, is not designed to be secure but to be open and accessible. Accessibility however, comes with threats, risk to data, risk to infrastructure security, and risk to system’s controls. The phrase cyber threat has become our reality. 

By sea, 90% of the goods transported around the planet are by oil tankers and container vessels that travel our oceans (Wagstaff, 2014). The ships’ crews get smaller and ships get larger as we focus technology on automation, remote monitoring, and navigational systems, these can be cyber attacked. Researchers from the University of Texas verified that it was possible to change a ship's direction by simulating a GPS signal to target a ship’s onboard navigation system (Schmidt, 2015). Somali pirates are surfing the Internet for information that can help them with targeting vulnerable and valuable ships (Cyber; Information Security; Crime; Maritime, 2016). Pirates have the ability to access databases, which gives them access to a ship’s blueprints. Once they have the blueprints, they know where the ship is headed and what cargo is on board. (Klöcker, 2016).

Read More

Topics: Military, Cybersecurity, Homeland Security, College of Health and Human Services


Posted by Dr. Rudolph Bustos on Apr 15, 2016 3:49:00 PM

Considering entering the disaster management or homeland security field, but not sure of how to go about it?

The first step is to review the job requirements, required experience, and degree requirements for a disaster manager position. According to the Occupational Outlook Handbook, employment for disaster managers is projected to grow 6% from 2014 to 2024. Current median salary is close to $65,000 with bachelor’s degree being the entry-level degree. Of note to those retired military or those anticipating retirement, military experience is a desirable background for some employers.

Read More

Topics: Veterans, Faculty, Military, Homeland Security, Careers, Emergency Disaster Management


Posted by Dr. Rudolph Bustos on Sep 8, 2015 5:00:00 AM

Growing out of asymmetric warfare—thanks to advances in technologies—is the cyber battlefield in which sensitive infrastructures are compromised or destroyed by belligerents. Pick up any newspaper or reputable internet news site, and one will read about a blatant cyberattack on a financial institution, a governmental agency, or even the Pentagon.  

Currently, the U.S. Army Cyber Command’s Cyber force has been growing exponentially for two years. The Army’s Cyber Chief, Lt. Gen. Edward C. Cardon noted: “Cyberspace continues to grow more complex, with sophisticated threats that are capable of exploiting known and unknown vulnerabilities, threatening both national security and America's economic interests.” The threat is real; the threat is growing.

The Department of Homeland Security Secretary seeks to form a new subcommittee on cybersecurity practices.

Read More

Topics: Master's Degrees, Bachelor's Degrees, College of Health Sciences, Cybersecurity, Homeland Security