Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Entire DC Network

Research Days Poster: Creation Of A Non-Profit And Non-Governmental Organization Cybersecurity Incident Reporting And Dataset Repository, Heni Patel, Gurdeep Singh Apr 2024

Research Days Poster: Creation Of A Non-Profit And Non-Governmental Organization Cybersecurity Incident Reporting And Dataset Repository, Heni Patel, Gurdeep Singh

Center for Cybersecurity

Cyber attacks have become a major concern in today’s digital age, affecting organizations across various sectors and industries. Cyber attacks have increased over the years, with new attacks emerging, putting various public and private entities at risk. Non-Profit Organizations (NPOs) and Non-Governmental Organizations (NGOs) are no exception and are increasingly becoming targets of cyberattacks. In this context, cybersecurity has become a critical issue for NPOs and NGOs as they handle sensitive data and information related to their donors, beneficiaries, and operations. In this poster, we will delve into the topic of cybersecurity in the context of NGOs, exploring the types …


Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon Apr 2024

Reducing Bias In Cyberbullying Detection With Advanced Llms And Transformer Models, Dahana Moz Ruiz, Annaliese Watson, Anjana Manikandan, Zachary Gordon

Center for Cybersecurity

This paper delved into a comprehensive exploration of the inherent biases present in Large Language Models (LLMs) and various Transformer models, with a focus on their role in identifying and addressing instances of cyberbullying. The objective was to refine and enhance the accuracy and fairness of these models by mitigating the biases deeply ingrained in their structures. This was crucial because language models could inadvertently perpetuate and amplify existing biases present in the data they were trained on.


Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino Feb 2024

Life During Wartime: Proactive Cybersecurity Is A Humanitarian Imperative, Stanley Mierzwa, Diane Rubino

Center for Cybersecurity

In brief:

  • Humanitarian agencies responding to conflict face massive challenges in distributing aid. Cyberattacks add to that burden.
  • This short overview, tailored for non-technical leaders, demystifies the process and equips clouds security experts to proactively champion cloud security at non-profits, and non-governmental organizations.

Proactive Cybersecurity is a Humanitarian Imperative | CSA (cloudsecurityalliance.org)


Alice In Cyberspace 2024, Stanley Mierzwa Jan 2024

Alice In Cyberspace 2024, Stanley Mierzwa

Center for Cybersecurity

‘Alice in Cyberspace’ Conference Nurtures Women’s Interest, Representation in Cybersecurity


Pre-College Students Steam To Future Career Success At Kean, Cybersecurity Center For Aug 2023

Pre-College Students Steam To Future Career Success At Kean, Cybersecurity Center For

Center for Cybersecurity

Pre-College Students STEaM to Future Career Success at Kean


Practical Approaches And Guidance To Small Business Organization Cyber Risk And Threat Assessments, Stanley Mierzwa, Aneta Klepacka Jul 2023

Practical Approaches And Guidance To Small Business Organization Cyber Risk And Threat Assessments, Stanley Mierzwa, Aneta Klepacka

Center for Cybersecurity

Cyber-attacks and breaches can occur in any organization type, and the areas of small businesses are not exempt from this nefarious activity. This research note and rapid review provide various cybersecurity tools, guidelines, and frameworks that a small business can consider when embarking on the action to assess its cybersecurity hygiene and defensive stance. The content was pulled together in response to the need for an easy-to-digest approach that a small business utilizes to gain valuable confidence to undertake a self-assessment or third-party review of an organization’s cybersecurity plans. Regarding cybersecurity concerns, doing nothing is not an option, and taking …


Research Days Poster: Cyberbullying Detection Utilizing Artificial Intelligence And Machine Learning, Annaliese Watson, Aysha Gardner, Dahana Moz Ruiz Apr 2023

Research Days Poster: Cyberbullying Detection Utilizing Artificial Intelligence And Machine Learning, Annaliese Watson, Aysha Gardner, Dahana Moz Ruiz

Center for Cybersecurity

Technology is a tool that can be used to gain knowledge and for advancements in areas like medicine, machinery, and everyday tasks. It can be used to connect with friends, work from home, and to improve quality of life. But some social media users can use it to hurt others. Cyberbullying is a major issue that has been steadily growing over the past few years. Cyberbullying has also steadily increased the rates of stress, anxiety, depression, violent behavior, low self-esteem and may cause suicide. Cyberbullying is an ongoing problem for social media users, and it is urgent that a solution …


Research Days Poster: A Study On Ransomware And Possible Mitigations, Robin Singh, Jing-Chiou Liou Apr 2023

Research Days Poster: A Study On Ransomware And Possible Mitigations, Robin Singh, Jing-Chiou Liou

Center for Cybersecurity

Ransomware is a quite violent attack that has been persistent throughout the industry for so many years. This malware doesn’t only affect the regular computer users but it has been targeting the big organizations and businesses also. Ransomware (ransom software) is a subset of malware designed to restrict access to a system or data until a requested ransom amount from the attacker is satisfied [2].In this poster, we will go over our findings on ransomware spreads, its actions, exploited vulnerabilities and few mitigation to reduce the impact of infection.


Run Toward The Incident: Collaboration Between Academia And Law Enforcement For Cybersecurity, Center For Cybersecurity, Stanley Mierzwa Apr 2023

Run Toward The Incident: Collaboration Between Academia And Law Enforcement For Cybersecurity, Center For Cybersecurity, Stanley Mierzwa

Center for Cybersecurity

Collaboration and partnership between academia and law enforcement can bring about positive contributions for future research and activities in cybersecurity.


Research Days Poster: Cyber Threats On The Manufacturing Sector, Afifa Ghouse Apr 2023

Research Days Poster: Cyber Threats On The Manufacturing Sector, Afifa Ghouse

Center for Cybersecurity

Manufacturing companies are more vulnerable to internet attacks now that they are more reliant on technology and digital infrastructure. Cyberattacks on the manufacturing industry can have serious consequences, such as production delays, the theft of intellectual property, and damage to one's reputation. At least 437 ransomware assaults occurred in the manufacturing sector in 2022, making up more than 70% of these expensive and disruptive attacks.


A Study Of Issues And Mitigations On Ddos And Medical Iot Devices, Jing-Chiou Liou, Robin Singh Apr 2023

A Study Of Issues And Mitigations On Ddos And Medical Iot Devices, Jing-Chiou Liou, Robin Singh

Center for Cybersecurity

The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient's data for their treatment. .


Poster Research Days: Preliminary Researching The Potential Cybersecurity Threats By Using Virtual Reality Headsets, Rashaad Couloote Apr 2023

Poster Research Days: Preliminary Researching The Potential Cybersecurity Threats By Using Virtual Reality Headsets, Rashaad Couloote

Center for Cybersecurity

This research aims to examine cybersecurity concerns related to Virtual Reality (VR) headsets. Specifically, we will conduct a literature review to identify relevant articles on the topic, which will be analyzed and summarized in detail. In addition, we will explore VR headsets through practical hands-on exercises to better understand their components and general categories. This process will outline potential cybersecurity vulnerabilities and threats associated with VR headsets. This research will provide valuable insights into the current state of cybersecurity for VR technology and inform recommendations for improving security measures to protect users' data and privacy


Research Days Poster: Security Operation Center, Jaineel A. Shah, Jing-Chiou Liou Apr 2023

Research Days Poster: Security Operation Center, Jaineel A. Shah, Jing-Chiou Liou

Center for Cybersecurity

A Security Operations Center (SOC) is an organizational framework for cybersecurity, staffed by cybersecurity professionals who monitor an organization's security, analyze potential or current breaches, and respond accordingly. The SOC's goal is to diagnose, evaluate, and respond to cybersecurity events using technology solutions and established procedures. SOCs mainly operate 24/7, with security analysts monitoring environmental data for emerging threats and responding as needed. The SOC manages and enhances an organization's overall security posture.


Research Days Poster: An Analysis Of Sql Injection Techniques, Uko Ebreso, Pankati Patel, Jing-Chiou Liou Apr 2023

Research Days Poster: An Analysis Of Sql Injection Techniques, Uko Ebreso, Pankati Patel, Jing-Chiou Liou

Center for Cybersecurity

Storing information in a database allows web applications to operate with users who have their information stored online. ● The retrieval of information from the database is done using Structured Query Language (SQL) - a language used by the database that allows for data manipulation. ● SQL Injection (SQLIi) is an attack on a susceptible system using SQl which results in a loss of confidentiality, authentication, authorization and integrity of the software/system.


Kean University Students Preparing For Cybersecurity Certification Exams In Free Summer Program, Stanley Mierzwa Jul 2022

Kean University Students Preparing For Cybersecurity Certification Exams In Free Summer Program, Stanley Mierzwa

Center for Cybersecurity

Fifteen Kean University students and recent graduates this summer are studying for cybersecurity certifications in a virtual pilot program offered free of charge through the University’s Center for Cybersecurity.


Ransomware Incident Preparations With Ethical Considerations And Command System Framework Proposal, Stanley Mierzwa, James Drylie, Dennis Bogdan Apr 2022

Ransomware Incident Preparations With Ethical Considerations And Command System Framework Proposal, Stanley Mierzwa, James Drylie, Dennis Bogdan

Center for Cybersecurity

Concerns with cyber-attacks in the form of ransomware are on the mind of many executives and leadership staff in all industries. Inaction is not an option, and approaching the topic with real, honest, and hard discussions will be valuable ahead of such a possible devastating experience. This research note aims to bring thoughtfulness to the topics of ethics in the role of cybersecurity when dealing with ransomware events. Additionally, a proposed set of non-technical recovery preparation tasks are outlined to help organizations bring about cohesiveness and planning for dealing with the real potential of a ransomware event. Constraints from many …


An Overview Of The Potential For Blockchain Technology To Improve Cybersecurity, Stanley Mierzwa Apr 2022

An Overview Of The Potential For Blockchain Technology To Improve Cybersecurity, Stanley Mierzwa

Center for Cybersecurity

The purpose of this short research commentary is to provide a focused, semi-deep dive into the effort the industry places on cybersecurity defense and operations and the potential to integrate blockchain technology. As cybersecurity threats and incidents continue to rise, better procedures and strategies to protect our organizations’ data and systems are crucial to sustaining viable operations. Given that blockchain technology can potentially disrupt other industries (Moore, 2020), it is imperative to examine how it may improve our cybersecurity.


Cybersecurity Best Practices For The Manufacturing Industry, David Ortiz, Stanley Mierzwa Apr 2022

Cybersecurity Best Practices For The Manufacturing Industry, David Ortiz, Stanley Mierzwa

Center for Cybersecurity

The manufacturing and industrial sectors have evolved with the introduction of technologies over the past many decades. Progress in improving processes, techniques, output, quality, and efficiencies have been gained with new emerging technologies, resulting in positive and fortuitous changes for organizations. With the rapid movement towards a modern-day manufacturing environment, new and connected technologies that employ greater cyber-connectedness continue to grow, but at the same time, introduce cybersecurity risks.


Creation Of A Customized College Student Cybersecurity Awareness Online Learning Solution, Stanley Mierzwa, Iassen Christov, Bruno Lima Jul 2021

Creation Of A Customized College Student Cybersecurity Awareness Online Learning Solution, Stanley Mierzwa, Iassen Christov, Bruno Lima

Center for Cybersecurity

Many businesses, agencies, for-profit and non-profit organizations have implemented cybersecurity awareness training programs for their staff.


Cybersecurity Considerations With The Increasing Uses Of Small Unmanned Aircraft Systems (Suas) Or Drones, Matthew Kucharek, Stanley Mierzwa May 2021

Cybersecurity Considerations With The Increasing Uses Of Small Unmanned Aircraft Systems (Suas) Or Drones, Matthew Kucharek, Stanley Mierzwa

Center for Cybersecurity

The effort to produce this information resource results from a collaborative effort between the Bergen County Technical Schools (high school), through the advisor Andrea Buccino, and a cybersecurity expert mentor. High school senior members of this learning partnership are provided with an interactive learning experience. They gain an increase and knowledge in a particular area of study while under the topical guidance of a mentor. In this example, the high school senior is pursuing coursework in Aerospace Engineering, and this was combined with the focus of cybersecurity to expand the students’ cross-discipline knowledge. This collaborative work was done virtually, given …


Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Bok Gyo Jeong, Claire Yun Nov 2020

Proposal For The Development And Addition Of A Cybersecurity Assessment Section Into Technology Involving Global Public Health, Stanley Mierzwa, Bok Gyo Jeong, Claire Yun

Center for Cybersecurity

This paper discusses and proposes the inclusion of a cyber or security risk assessment section during the course of public health initiatives involving the use of information and communication computer technology. Over the last decade, many public health research efforts have included information technologies such as Mobile Health (mHealth), Electronic Health (eHealth), Telehealth, and Digital Health to assist with unmet global development health needs. This paper provides a background on the lack of documentation on cybersecurity risks or vulnerability assessments in global public health areas. This study suggests existing frameworks and policies be adopted for public health. We also propose …


Need Based Evaluation Of Cloud Services In The Wake Of Covid-19, Samir Souidi, Stanley Mierzwa Aug 2020

Need Based Evaluation Of Cloud Services In The Wake Of Covid-19, Samir Souidi, Stanley Mierzwa

Center for Cybersecurity

For many organizations, particularly those that may be considered legacy, or older existing enterprises, the recent COVID-19 pandemic may be pushing them to further progress into the realm of cloud services. With the global population asked to quarantine or shelter-in-place during the pandemic spread of 2020, many businesses that were able to function with their workforce remotely had no choice but to do so. Having information systems available with true remote access capabilities was a must. For those organizations who had already moved to a cloud-based model, they found themselves in a far better situation than those firms who still …


Doing More To Support Those Residing In Assisted Living Or Eldercare Facilities With Cybersecurity And Cybercrime Prevention, Stanley Mierzwa Jan 2020

Doing More To Support Those Residing In Assisted Living Or Eldercare Facilities With Cybersecurity And Cybercrime Prevention, Stanley Mierzwa

Center for Cybersecurity

As the U.S. population continues to age, those entering senior living arrangements will continue to grow and with that potential this population is more likely to be the regular users of computers, laptops, smartphone/tablets and Internet.


Greater Cybersecurity Threat Predictions With A Primer In Machine Learning, Samir Souidi, Stanley Mierzwa Jan 2020

Greater Cybersecurity Threat Predictions With A Primer In Machine Learning, Samir Souidi, Stanley Mierzwa

Center for Cybersecurity

Why is it that Big Data services such as Netflix can predict, with reasonable accuracy, the movies and programs that I may be interested in when I connect to their service? When I access Amazon.com Online Shopping, I get a good glimpse of items I purchased in the past, and at what timeframe, and also a prediction if it is time to repurchase it? Machine Learning (ML) and Artificial Intelligence (AI) probably hold the key to the reasons these predictions are performed so well. So, why can’t we predict, at least at a small-scale level, when and what type of …


On The Potential, Feasibility, And Effectiveness Of Chat Bots In Public Health Research Going Forward, Stanley Mierzwa, Samir Souidi, Tammy Allen Sep 2019

On The Potential, Feasibility, And Effectiveness Of Chat Bots In Public Health Research Going Forward, Stanley Mierzwa, Samir Souidi, Tammy Allen

Center for Cybersecurity

This paper will discuss whether bots, particularly chat bots, can be useful in public health research and health or pharmacy systems operations. Bots have been discussed for many years; particularly when coupled with artificial intelligence, they offer the opportunity of automating mundane or error-ridden processes and tasks by replacing human involvement. This paper will discuss areas where there are greater advances in the use of bots, as well as areas that may benefit from the use of bots, and will offer practical ways to get started with bot technology. Several popular bot applications and bot development tools along with practical …


Cybersecurity Considerations With The Increasing Uses Of Small Unmanned Aircraft Systems (Suas) Or Drones, Matthew Kucharek, Stanley Mierzwa May 2001

Cybersecurity Considerations With The Increasing Uses Of Small Unmanned Aircraft Systems (Suas) Or Drones, Matthew Kucharek, Stanley Mierzwa

Center for Cybersecurity

The effort to produce this information resource results from a collaborative effort between the Bergen County Technical Schools (high school), through the advisor Andrea Buccino, and a cybersecurity expert mentor. High school senior members of this learning partnership are provided with an interactive learning experience. They gain an increase and knowledge in a particular area of study while under the topical guidance of a mentor. In this example, the high school senior is pursuing coursework in Aerospace Engineering, and this was combined with the focus of cybersecurity to expand the students’ cross-discipline knowledge. This collaborative work was done virtually, given …