Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Social and Behavioral Sciences

Teamwork In Cybersecurity: Evaluating The Cooperative Board Game [D0x3d!] As An Experimental Testbed, Crystal Fausett, Joseph Keebler Oct 2023

Teamwork In Cybersecurity: Evaluating The Cooperative Board Game [D0x3d!] As An Experimental Testbed, Crystal Fausett, Joseph Keebler

Publications

It is crucial to identify the knowledge, skills, and attitudes (KSAs) that contribute to success in cybersecurity teams. We introduce a board game, [d0x3d!], as an experimental testbed designed to create a controlled environment and set of manageable tasks aimed at exploring teamwork competencies that may be relevant to the cybersecurity workforce. [d0x3d!] requires players to work together and share information to retrieve stolen digital assets. The authors aim to improve the efficacy of cybersecurity team training by incorporating modern teamwork theory and measurement. This testbed provides a low-cost and user-friendly platform for training, evaluation, and research.


Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri May 2021

Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri

Publications

As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.


Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri Apr 2021

Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri

Publications

The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply chain in managing and mitigating risks, and the authors define C-SCRM as the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of information and operational technology products and service supply chains. As Special Operations Forces increasingly rely on sophisticated hardware and software products, this quick, well-researched monograph provides a detailed accounting of C-SCRM associated laws, regulations, instructions, tools, and strategies meant to mitigate vulnerabilities and risks—and how we might best manage the evolving and ever-changing array of …


Examining Pilot Response To Cybersecurity Events On The Flight Deck, Meredith Carroll Ph.D., Summer Rebensky, Paige Sanchez Mar 2020

Examining Pilot Response To Cybersecurity Events On The Flight Deck, Meredith Carroll Ph.D., Summer Rebensky, Paige Sanchez

National Training Aircraft Symposium (NTAS)

Cybersecurity is a growing concern in the aviation industry. In general, cybersecurity research has typically focused on providing technical solutions such as hardening networks and improving computer systems, with little focus on the human operator. Human operators, such as pilots, are often the last line of defense; however, it is currently unclear whether pilots can recognize cybersecurity vulnerabilities, detect when a system is being compromised, and respond appropriately to a cybersecurity event. A review of literature revealed three key stages in cybersecurity response decision process (susceptibility, detection, and response) that are influenced by eight separate factors (perceived susceptibility, perceived safeguard …


A Taxonomy Framework For Maritime Cybersecurity: A Demonstration Using The Automatic Identification System, G. C. Kessler, J. P. Craiger, J. C. Haass Sep 2018

A Taxonomy Framework For Maritime Cybersecurity: A Demonstration Using The Automatic Identification System, G. C. Kessler, J. P. Craiger, J. C. Haass

Publications

The maritime transportation system is increasingly a target of cyber attacks. This paper describes a taxonomy that supports the creation of adversarial cyber models, risk mitigation, and resiliency plans as applied to the maritime industry, using the Automatic Identification System as a specific illustration of the approach. This method has already been applied to the aviation sector; retooling it for a maritime example demonstrates its broad applicability to the transportation sector, in general.


Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James D. Ramsay Jan 2013

Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James D. Ramsay

Applied Aviation Sciences - Daytona Beach

Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …


Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay Jan 2013

Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay

Applied Aviation Sciences - Daytona Beach

Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …


Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay Jan 2013

Paradigms For Cybersecurity Education In A Homeland Security Program, Gary C. Kessler, James Ramsay

Security Studies & International Affairs - Daytona Beach

Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that …


Cybersecurity: Growing Like Topsy!, Ibpp Editor Oct 2010

Cybersecurity: Growing Like Topsy!, Ibpp Editor

International Bulletin of Political Psychology

This article discusses cybersecurity in an intelligence context – what it is, what it does to us, and the sudden (and somewhat unplanned) increase in financial support for the area.