Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Engineering (1)
- Computer Sciences (1)
- Digital Communications and Networking (1)
- Education (1)
- Educational Methods (1)
-
- Engineering (1)
- Industrial Technology (1)
- Information Security (1)
- Operations Research, Systems Engineering and Industrial Engineering (1)
- Other Computer Engineering (1)
- Other Computer Sciences (1)
- Other Education (1)
- Physical Sciences and Mathematics (1)
- Science and Mathematics Education (1)
- Vocational Education (1)
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
Cyber Attacks Against Industrial Control Systems, Adam Kardorff
LSU Master's Theses
Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …
An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley
An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley
LSU Master's Theses
The growing cybersecurity workforce gap underscores the urgent need to address deficiencies in cybersecurity education: the current education system is not producing competent cybersecurity professionals, and current efforts are not informing the non-technical general public of basic cybersecurity practices. We argue that this gap is compounded by a fundamental disconnect between cybersecurity education literature and established education theory. Our research addresses this issue by examining the alignment of cybersecurity education literature concerning educational methods and tools with education literature.
In our research, we endeavor to bridge this gap by critically analyzing the alignment of cybersecurity education literature with education theory. …