Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Education

Ways To Make Cybersecurity Education/Opportunities More Accessible In The Philippine Public School System, Joshua Oania Dec 2023

Ways To Make Cybersecurity Education/Opportunities More Accessible In The Philippine Public School System, Joshua Oania

Cybersecurity Undergraduate Research Showcase

This paper will examine how the Philippines can make cybersecurity education more accessible in their public school system. The solutions it proposes include making cybersecurity a part of the school curriculum, creating summer/internship programs for Junior and Senior High School students in multiple different areas within cybersecurity, and providing basic infrastructure and resources for students to meet their educational needs and aspirations.


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim Dec 2023

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


Simulating Function Generators And Oscilloscopes In A Virtual Laboratory Environment, Yiyang Li, Yuzhong Shen, Charles I. Sukenik Apr 2023

Simulating Function Generators And Oscilloscopes In A Virtual Laboratory Environment, Yiyang Li, Yuzhong Shen, Charles I. Sukenik

Modeling, Simulation and Visualization Student Capstone Conference

This paper discusses the development of a virtual laboratory for simulating electronic instruments commonly used in science and engineering courses, such as function generators and digital storage oscilloscopes. Mathematical equations are used to represent continuous signals and ensure signal integrity, while C# delegates are adopted to enable communication between simulated devices. The approach allows for loose coupling between software components and high cohesion of individual components, and can be applied to other virtual laboratory developments. The virtual laboratory provides a means for students to gain hands-on experience with electronic instruments and improve their understanding of theoretical concepts.


Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams Apr 2023

Applicable Mitigation Strategies And Technology Propositions: Preventing Scamming In Marginalized Populations, Grace Nicole Sandhofer-Adams

Cybersecurity Undergraduate Research Showcase

This essay serves as a proposal for new technology and mitigation against the scamming of marginalized individuals (i.e., those over the age of 65). Research supports this outline, giving background to the types of scams, and prevention strategies currently seen in the cybersecurity landscape. It is evident that the methods we currently use to combat scamming attacks are not effective, therefore, I propose a new solution. This proposed telecommunications strategy is necessary to prevent scamming of all internet users, no matter the device. This telecommunication strategy would use artificial intelligence and machine learning to constantly improve its detection over time, …