University of Maryland University College (UMUC) Experts Available to Discuss Technology, Privacy, Policy Issues Related to Cybersecurity and Cyberwarfare

Share Article

October is National Cybersecurity Awareness Month. UMUC experts provide tips to protect personal data.

The increasing number of cyber attacks threaten our daily lives as we become more socially and economically dependent on the Internet and wireless technology. What can individuals do to protect themselves? What can organizations do to protect proprietary information and safeguard customer data? What can governments do to protect sensitive computer networks and military weapons?

In addition to a defensive posture and counter measures, public and private sector organizations are increasingly using offensive measures to preempt cyber attacks. What are companies and government agencies doing to thwart cyber attacks before they are even launched?

University of Maryland University College (UMUC), which was one of the first institutions to create online academic programs in cybersecurity, has faculty experts available to explain cyber threats, provide tips to help individuals protect their data, and offer analysis of cyber attacks and cyber warfare.

To contact the following UMUC faculty, please call Bob Ludwig at 301-985-7253 or email at Robert(dot)ludwig(at)umuc(dot)edu.

Alan Carswell, Ph.D.
Chair, Cybersecurity and Information Assurance Department
Areas of expertise: development of large-scale information systems for the public and private sectors.

Clay Wilson, Ph.D.
Director, Cybersecurity Policy Program
Areas of expertise: cyber defense and cyber terrorism, nonproliferation for cyber weapons, control of cyber weapons, cybercrime, net-centric warfare and the cyber capabilities of terrorist groups.

Rose Shumba, Ph.D.
Director, Digital Forensics and Cyber Investigation Program
Areas of expertise: digital forensics, secure software development, cloud computing, human computer interaction and security, and gender and computer science/information assurance.

Valorie King, Ph.D.
Collegiate Associate Professor, cybersecurity and information assurance
Areas of expertise: software systems engineering for both government and industry, cybersecurity, information assurance, digital forensics and cyber investigation.

Richard White, Ph.D.
Associate Professor, cybersecurity and information assurance
Areas of expertise: cybersecurity infrastructure, network systems design, security technology implementation, security policy development and enforcement and rapid deployment of cyber threat detection and remediation technologies.

Charles Pak, Ph.D.
Associate Professor, cybersecurity and information assurance
Areas of expertise: large-scale data centers, cybersecurity, critical infrastructure protection, cyber counter terrorism, and risk assessment and management.

Amy Harding, Ph.D.
Associate Professor, cybersecurity and information assurance
Areas of expertise: information management, information systems requirements and architecture.


1.    Use passwords that are not obviously related to you, because those are the first guesses that a hacker will use to access your accounts. Examples of bad passwords: your name, your user ID, “password”, “12345”.

2.    Be wary of joining unknown WiFi networks. Hackers sometimes set up such networks to capture and store what users send, including IDs and passwords.

3.    Don’t email (or tweet, or post in Facebook) anything that you don’t want made public. Period.

4.    Be suspicious of any email unless you know from whom it came, and have reason to expect the email. Hackers can make an email look like it came from anyone.

5.    Many financial institutions offer a feature where they will send you an email whenever there is a large transaction (charge, withdrawal, etc.) against your account. Consider enabling that option. If someone illegitimately accesses your account, you will learn about it quickly.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Robert Ludwig
Email >
Visit website