Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Agriculture (1)
- Asynchronous file transfer (1)
- Audits (1)
- Augmented Reality (1)
- Cybersecurity (1)
-
- Cybersecurity Training and Education (1)
- Dairy Farming (1)
- E-agriculture (1)
- Extended Reality (1)
- File servers (1)
- File systems (1)
- File transfer (1)
- ISO (1)
- Information Security Systems (1)
- Information and communication technology (ICT) (1)
- Isolated clusters (1)
- Java ME (1)
- M-Agriculture (1)
- Mobile Applications (1)
- NIST (1)
- Research (1)
- Risk Assessment (1)
- Security Awareness Training (1)
- Short Message Service(SMS) (1)
- South Africa (1)
- Systematic literature review (1)
- Transport processes (1)
- Virtual Reality (1)
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Business
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Turnstile File Transfer: A Unidirectional System For Medium-Security Isolated Clusters, Mark Monnin, Lori L. Sussman
Journal of Cybersecurity Education, Research and Practice
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote learning environments for research as well. Researchers and students use these isolated environments to test sophisticated hardware, software, and procedures using full-fledged operating systems, networks, and applications. Virus and malware researchers may wish to release suspected malicious software in a controlled environment to observe their behavior better or gain the information needed to assist their reverse engineering processes. …
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Leveraging Vr/Ar/Mr/Xr Technologies To Improve Cybersecurity Education, Training, And Operations, Paul Wagner, Dalal Alharthi
Journal of Cybersecurity Education, Research and Practice
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that this problem has not improved and nearly 44% believe it has gotten worse over the past 10 years. Threat actors are continuing to evolve their tactics, techniques, and procedures for conducting attacks on public and private targets. Education institutions and companies must adopt emerging technologies to develop security professionals and to increase cybersecurity awareness holistically. …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
Secure Cloud-Based Iot Water Quality Gathering For Analysis And Visualization, Soin Abdoul Kassif Baba M Traore, Maria Valero, Amy Gruss
KSU Proceedings on Cybersecurity Education, Research and Practice
Water quality refers to measurable water characteristics, including chemical, biological, physical, and radiological characteristics usually relative to human needs. Dumping waste and untreated sewage is the reason for water pollution and several diseases to the living hood. The quality of water can also have a significant impact on animals and plant ecosystems. Therefore, keeping track of water quality is a substantial national interest. Much research has been done for measuring water quality using sensors to prevent water pollution. In summary, those systems are built based on online and reagent-free water monitoring SCADA systems in wired networks. However, centralized servers, transmission …
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …
The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki
The E-Agriculture Research Landscape In South Africa: A Systematic Literature Review, Alain Nzuzi Kintoki
The African Journal of Information Systems
Despite the growing interest in e-agriculture research in South Africa, academic studies have not sufficiently and deeply investigated the current e-agriculture research trends in the South African context. It is unclear how primary e-agriculture research in South Africa will aid both current and future generations to create new and better ways to transform agricultural development using this modern technology. This study sought to determine the current status of e-agriculture research in the South African context. A systematic literature review was used to gather and analyze data. The results indicate that 17 papers (26.5%) were published during the first two years …
Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana
Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana
KSU Proceedings on Cybersecurity Education, Research and Practice
The economic impact of Mobile IP, the standard that allows IP sessions to be maintained even when switching between different cellular towers or networks, has been staggering in terms of both scale and acceleration (Doherty, 2016). As voice communications transition to all-digital, all-IP networks such as 4G, there will be an increase in risk due to vulnerabilities, malware, and hacks that exist for PC-based systems and applications (Harwood, 2011). According to Gostev (2006), in June, 2004, a well-known Spanish virus collector known as VirusBuster, emailed the first known mobile phone virus to Kaspersky Lab, Moscow. Targeting the Symbian OS, the …
A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu
A Model For Designing M-Agriculture Applications For Dairy Farming, Amos Gichamba, Ismail A. Lukandu
The African Journal of Information Systems
In the recent past, developing countries have experienced major technological advancements including high mobile phone penetration. With the implementation of innovative technological solutions (e.g. mobile-based systems in key economic activities such as agriculture), there is need to develop models that software developers and researchers can use to design solutions. This paper aims to study the implementation of mobile systems in agriculture and presents a model for designing such applications. This study shows that models exist for general mobile applications design and development, although none specifically suits mobile agriculture applications. A model for designing and implementing M-Agriculture applications is presented. The …