Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Old Dominion University

Computer Sciences

Cybersecurity

Virginia Journal of Science

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

A Targeted Study On The Match Between Cybersecurity Higher Education Offerings And Workforce Needs, Diane Murphy, Nektaria Tryfona, Andrew M. Marshall Apr 2023

A Targeted Study On The Match Between Cybersecurity Higher Education Offerings And Workforce Needs, Diane Murphy, Nektaria Tryfona, Andrew M. Marshall

Virginia Journal of Science

The Cybersecurity Workforce Gap is a call to action on a two-fold problem: the worldwide shortage of qualified cybersecurity workers and the need to develop a growing highly-knowledgeable, agile, well-trained cybersecurity workforce. This paper presents a methodological approach to achieve this goal in the Northern Virginia area. The area is characterized by an abundance of cyber-related industries, government agencies, and large businesses with high demand of skilled cybersecurity workers; at the same time, academic institutions offer cutting edge education and training access to highly capable students. Central to this methodology is the collaboration between local academia and industry and it …


A Survey On Securing Personally Identifiable Information On Smartphones, Dar’Rell Pope, Yen-Hung (Frank) Hu, Mary Ann Hoppa Oct 2020

A Survey On Securing Personally Identifiable Information On Smartphones, Dar’Rell Pope, Yen-Hung (Frank) Hu, Mary Ann Hoppa

Virginia Journal of Science

With an ever-increasing footprint, already topping 3 billion devices, smartphones have become a huge cybersecurity concern. The portability of smartphones makes them convenient for users to access and store personally identifiable information (PII); this also makes them a popular target for hackers. This survey shares practical insights derived from analyzing 16 real-life case studies that exemplify: the vulnerabilities that leave smartphones open to cybersecurity attacks; the mechanisms and attack vectors typically used to steal PII from smartphones; the potential impact of PII breaches upon all parties involved; and recommended defenses to help prevent future PII losses. The contribution of this …