Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley Mar 2024

An Analysis And Ontology Of Teaching Methods In Cybersecurity Education, Sarah Buckley

LSU Master's Theses

The growing cybersecurity workforce gap underscores the urgent need to address deficiencies in cybersecurity education: the current education system is not producing competent cybersecurity professionals, and current efforts are not informing the non-technical general public of basic cybersecurity practices. We argue that this gap is compounded by a fundamental disconnect between cybersecurity education literature and established education theory. Our research addresses this issue by examining the alignment of cybersecurity education literature concerning educational methods and tools with education literature.

In our research, we endeavor to bridge this gap by critically analyzing the alignment of cybersecurity education literature with education theory. …


Assessing Organizational Investments In Cybersecurity And Financial Performance Before And After Data Breach Incidents Of Cloud Saas Platforms, Munther B. Ghazawneh Jan 2024

Assessing Organizational Investments In Cybersecurity And Financial Performance Before And After Data Breach Incidents Of Cloud Saas Platforms, Munther B. Ghazawneh

CCE Theses and Dissertations

Prior research indicated that providing inappropriate investment in organizations for Information Technology (IT) security makes these organizations suffer from IT security issues that may cause data breach incidents. Data breaches in cloud Software as a Service (SaaS) platforms lead to the disclosure of sensitive information, which causes disruption of services, damage to the organizational image, or financial losses. Massive data breaches still exist in cloud SaaS platforms which result in data leaks and data theft of customers in organizations.

IT security risks and vulnerabilities cost organizations millions of dollars a year as organizations may face an increase in cybersecurity challenges. …


Mitigating Cyber Espionage: A Network Security Strategy Using Notifications, Claire Headland Jan 2024

Mitigating Cyber Espionage: A Network Security Strategy Using Notifications, Claire Headland

Williams Honors College, Honors Research Projects

Network security and its mitigation of cyber espionage is paramount to the confidentiality, integrity, and availability of data within the intelligence field. With the advancing efficacy of social engineering to execute cyber espionage attacks, further measures and fail-safe mechanisms have become necessary. If a malicious actor successfully penetrates the network, suspending confidential data transmissions over the compromised network becomes crucial. However, connected users need a platform to receive security notifications and, therefore, need to know that their continued network use compromises more data. This project eliminates this by achieving two primary objectives: designing a multi- layered, hardened, and segmented network …