he aim of the project was to conduct a systemic design study to evaluate Australia'sopportunities and barriers for achieving a technological advantage in light of regional military technological advancement. It focussed on the three domains of (1) cybersecurity technology, (2) information technology, and (3) space technology.
In cybersecurity competitions, participants either create new or protect preconfigured information systems and then defend these systems against attack in a real-world setting. Institutions should consider important structural and resource-related issues before establishing such a competition. Critical infrastructures increasingly rely on information systems and on the Internet to provide connectivity between systems. Maintaining and protecting these systems requires an education in information warfare that doesn't merely theorize and describe such concepts. A hands-on, active learning experience lets students apply theoretical concepts in a physical environment. Craig Kaucher and John Saunders found that even for management-oriented graduate courses in information assurance, such an experience enhances the students' understanding of theoretical concepts.
This study explores cybersecurity requirements in the defense acquisition process. The literature review exposes cybersecurity challenges that the government faces in the federal acquisition process, and the researcher examines cybersecurity requirements in defense acquisition documents.
We discuss the NICE Cybersecurity Workforce Framework (NCWF), and its role in aligning cybersecurity jobs with candidates. As a workforce development tool, the NCWF can contribute to better retention, reduced new hire training, and cybersecurity education development.
Young adults aged between 18 and 30 are likely to encounter increasing cyber threats. Understanding the cybersecurity behaviors of young adults, and identifying the measures and factors that can help reduce cyber threats is thus crucial. Since the existing studies have not sufficiently explored these factors, this study adopted a socio-behavioral perspective. It employed the primary constructs of the theory of planned behavior (TPB) with other factors, including perceived awareness and knowledge of cyber threats, to predict young adults' behavioral intent to practice cybersecurity behaviors. Data were collected from a random sample of 1581 young adults studying at Technical and Vocational Training Corporation (TVTC) colleges in Saudi Arabia through an online survey and were analyzed using the least-squares partial structural equation modeling (SEM).
The purpose of this qualitative exploratory study was to research the strategies cybersecurity specialists need to improve adaptive cyber defenses within the financial sector. The research question asked: What are the strategies cybersecurity specialists need to improve adaptive cyber defenses within the United States financial sector? The conceptual framework for this studymproposed using automation and intelligence sharing to speed the detection of and response to cyber attacks while using deception and adaptive defense methods to slow the attack.
One of the essential stages in increasing cyber security is implementing an effective security awareness program. This work studies the present level of security knowledge among Imam Abdulrahman Bin Faisal University college students. A module was created to assist the students in becoming more informed. The main contribution of this work is an assessment of cybersecurity awareness among the university students based on three essential aspects: password security, browser security, and social media. Numerous questions were designed and sent to them to evaluate their awareness. The current survey received as many as 450 responses with their answers. Various statistical analyses were applied to the responses, including the validity and reliability test, feasibility test of a variable, correlation test, multicollinearity test, multiple regression, and heteroskedasticity test, carried out using SPSS. Furthermore, a multiple linear regression model and coefficient of determination, a hypothesis test, ANOVA test, and a partial test using ANOVA were also carried out.
Behavioral determinants of cybersecurity have gained greater attention among information technology experts in recent years. However, drivers of risky cybersecurity behavior have not been widely studied. This exploratory study examines the extent to which risky cybersecurity behavior is predicted by factors of cybersecurity-related avoidance behavior. Self-reported risky cybersecurity behavior was examined in light of technology threat avoidance factors in a sample of 184 working adults in the United States.
In this study, we deployed scalable low-interaction honeypot in Amazon Elastic Compute Cloud (AWS EC2) instance across six different regions to determine the current threat landscape as well as how knowledgeable and ingenious threat actors could be in compromising internet-facing ICS. This work is an extended version of our work published in 14th EAI International Wireless Internet Conference.
This chapter analyses how the European Commission defines ‘defence’ in the context of globalised technology markets before then showing how the Commission intends to balance civil, security and defence research when the EU is funding defence research projects.