Media
Documents:
Videos:
Audio/Podcasts:
Biography
Andrew Green is a lecturer of Information Security and Assurance in the Information Systems Department, located in the Michael J. Coles College of Business at Kennesaw State University.
Green has over a decade of experience in information security. Prior to entering academia full-time, Green worked as an information security consultant, focusing primarily on the needs of small and medium-sized businesses. Green worked in the healthcare IT field, where he developed and supported transcription interfaces for medical facilities throughout the United States.
Green is pursuing his Ph.D. at Nova Southeastern University, where he is studying information systems with a concentration in information security. Green is also a co-author on a number of academic textbooks on various information security-related topics, published by Course Technology.
Industry Expertise (6)
Computer/Network Security
Computer Hardware
Computer Software
Computer Networking
Business Services
Information Technology and Services
Areas of Expertise (13)
Information Security
Firewalls
Linux
Computer Security
Vulnerability Assessment
Cybersecurity
Computer / Network Security
Hacking
Social Engineering
Information Security Policy
Cybercrime
Risk Management
Penetration Testing
Accomplishments (1)
Owner - Green Consulting (professional)
2002-01-01
Owner and Consultant
Education (3)
Nova Southeastern University: Ph.D., Information Systems 2016
Kennesaw State University: M.S., Information Systems 2007
Kennesaw State University: B.S.IS., Information Systems 2007
Affiliations (3)
- Metro Atlanta ISSA
- Kennesaw State University ISSA chapter
- ISSA
Links (1)
Media Appearances (2)
Trust and Caution
CBS46
2017-10-11
The Equifax hacking scandal highlights the tension between trust and caution. When it comes to computers and the internet that's a pretty complex balance. Andrew Green teaches the next generation of computer securers at Kennesaw State. He's investigated problems with hacking threats at Marta and the State Elections Office. The wifi here first caught his attention. "Anybody on the inside of the network, which is anybody with the password, can see every bit of traffic as if it was not encrypted."
Prep Your Business for a Data Breach
Cobb In Focus print
2015-12-01
"Typically the big breached come from organized adversaries who are looking for personal information about customers, credit card data of business clients or banking information about the business itself," says Andy Green, lecturer of information security and assurance in the Coles College of Business at Kennesaw State. "The options are much more understandable for business owners today, and many software applications include protections such as encryption to help companies shield their data."
Recent Papers (1)
Addressing Emerging Information Security Personnel Needs. A Look at Competitions in Academia: Do Cyber Defense Competitions Work?
AMCIS
2013 This paper is part of a proposed study that looks at the emerging information security personnel needs of organizations. We are attempting to explore the correlation between components of a regional cyber defense competition and an organization’s needs in terms of employing adequately trained information security personnel. We look to identify some unique characteristics of a regional academic cyber defense competition via the critical success factors method.