Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Business

Electronic Theses, Projects, and Dissertations

Cybersecurity

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie Dec 2021

Cyber Security Vulnerability Assessment In Learning Management Systems, Mohammad Rabie

Electronic Theses, Projects, and Dissertations

With online learning becoming in high demand to deliver training and education during the COVID-19 pandemic, cybercriminals have more opportunities to take advantage of vulnerable Learning Management Systems to steal information like training materials, and students' private information, or they try to make easy money by deploying ransomware. Regardless of the cybercriminal motivation, the compromised system has consequences on the organization that affects it financially, legally, and reputationally. This requires the organization to invest in choosing the most secure LMS and apply the required security controls to avoid such consequences that may cost them much more than expected.

This project …


Geofencing As Applied Within The Field Of Cybersecurity: An Overview Of Potential Risks And Advantages, Kasandra Adams Jun 2020

Geofencing As Applied Within The Field Of Cybersecurity: An Overview Of Potential Risks And Advantages, Kasandra Adams

Electronic Theses, Projects, and Dissertations

This culminating experience project explores geofencing as a potential risk and advantageous tool within the field of cybersecurity. Geofencing is defined here as a software program feature that allows its users to collect and deliver data within a specific targeted geographical area. Currently used applications are addressed from a cybersecurity mindset by applying the hacker methodology to demonstrate the potential threat. Additionally, geofencing is applied to the NIST Cybersecurity Framework to demonstrate potential benefits for cyber defence. Finally, vulnerabilities associated with applying geofencing to cyber defense, and its potential implications on privacy and cybersecurity laws is discussed and recommendations for …