Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (3)
- Computer Sciences (3)
- Information Security (3)
- Management Information Systems (3)
- Physical Sciences and Mathematics (3)
-
- Technology and Innovation (3)
- Education (2)
- Communications Law (1)
- Computer Law (1)
- Computer and Systems Architecture (1)
- Digital Communications and Networking (1)
- Higher Education (1)
- Intellectual Property Law (1)
- Internet Law (1)
- Law (1)
- Online and Distance Education (1)
- Privacy Law (1)
- Risk Analysis (1)
- Science and Technology Studies (1)
- Social and Behavioral Sciences (1)
- Keyword
-
- Cybersecurity (2)
- Asynchronous file transfer (1)
- Audits (1)
- Augmented Reality (1)
- Bi-LSTM (1)
-
- CNN (1)
- Cybersecurity Training and Education (1)
- Deep learning (1)
- Extended Reality (1)
- File servers (1)
- File systems (1)
- File transfer (1)
- ISO (1)
- Information Security Systems (1)
- Isolated clusters (1)
- Machine learning (1)
- NIST (1)
- Ransomware attack (1)
- Risk Assessment (1)
- Security Awareness Training (1)
- Transport processes (1)
- Virtual Reality (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Other Computer Engineering
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett
Experiences Of African Women In Stem Careers: A Systematic Literature Review., Kaluwa Siwale, Gwamaka Mwalemba, Ulrike Rivett
African Conference on Information Systems and Technology
The discourse on women's underrepresentation in science, technology, engineering, and mathematics (STEM) mainly centres on the global north, leaving a gap in understanding the perspectives of African women in STEM. To address this, a systematic literature review was conducted to explore African women's experiences in STEM careers and education. After applying inclusion and criteria, 18 published articles were analysed. 8 key issues emerge: work environment, education system, work-life balance, gender-based stereotypes, racial bias, sexual harassment, inadequate support/mentorship, and self-imposed limits. These themes intertwine, with some aspects influencing others. Grasping the complexities and interactions of these factors provides insights into challenges …
Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal
Detection Of Crypto-Ransomware Attack Using Deep Learning, Muna Jemal
Master of Science in Computer Science Theses
The number one threat to the digital world is the exponential increase in ransomware attacks. Ransomware is malware that prevents victims from accessing their resources by locking or encrypting the data until a ransom is paid. With individuals and businesses growing dependencies on technology and the Internet, researchers in the cyber security field are looking for different measures to prevent malicious attackers from having a successful campaign. A new ransomware variant is being introduced daily, thus behavior-based analysis of detecting ransomware attacks is more effective than the traditional static analysis. This paper proposes a multi-variant classification to detect ransomware I/O …
Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas
Ransomware: Evaluation Of Mitigation And Prevention Techniques, Juanjose Rodriguez-Cardenas
Symposium of Student Scholars
Ransomware is classified as one of the main types of malware and involves the design of exploitations of new vulnerabilities through a host. That allows for the intrusion of systems and encrypting of any information assets and data in order to demand a sum of payment normally through untraceable cryptocurrencies such as Monero for the decryption key. This rapid security threat has put governments and private enterprises on high alert and despite evolving technologies and more sophisticated encryption algorithms critical assets are being held for ransom and the results are detrimental, including the recent Colonial Pipeline ransomware attack in 2021 …