Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Marquette University

Theses/Dissertations

Cybersecurity

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Adaptive Pedagogy Framework For Risk Management, Incident Response And Disaster Recovery Education, Hsiao-An Wang Jul 2022

Adaptive Pedagogy Framework For Risk Management, Incident Response And Disaster Recovery Education, Hsiao-An Wang

Dissertations (1934 -)

The field of Cybersecurity, both in cybersecurity education and cybersecurity workforce demands, has been growing steadily as the dangers of cyber-threats continue to rise. The gap between the supply and demand of the cybersecurity workforce has been widening throughout the past decade. In response to the increased demand, many government agencies have actively engaged in collaborative efforts with higher education institutions to produce more capable graduates to address the need. However, with the various educational utilities available to instructors, few utilities offer content related to risk management, incident response, and disaster recovery practices. Furthermore, many students lack the awareness to …


Evaluating The Gasday Security Policy Through Penetration Testing And Application Of The Nist Cybersecurity Framework, Andrew Nicholas Kirkham Apr 2016

Evaluating The Gasday Security Policy Through Penetration Testing And Application Of The Nist Cybersecurity Framework, Andrew Nicholas Kirkham

Master's Theses (2009 -)

This thesis explores cybersecurity from the perspective of the Marquette University GasDay lab. We analyze three different areas of cybersecurity in three independent chapters. Our goal is to improve the cybersecurity capabilities of GasDay, Marquette University, and the natural gas industry. We present network penetration testing as a process of attempting to gain access to resources of GasDay without prior knowledge of any valid credentials. We discuss our method of identifying potential targets using industry standard reconnaissance methods. We outline the process of attempting to gain access to these targets using automated tools and manual exploit creation. We propose several …