توضیحاتی در مورد کتاب Information Security Education - Adapting to the Fourth Industrial Revolution: 15th IFIP WG 11.8 World Conference, WISE 2022, Copenhagen, Denmark, ... and Communication Technology, 650)
نام کتاب : Information Security Education - Adapting to the Fourth Industrial Revolution: 15th IFIP WG 11.8 World Conference, WISE 2022, Copenhagen, Denmark, ... and Communication Technology, 650)
عنوان ترجمه شده به فارسی : آموزش امنیت اطلاعات - تطبیق با چهارمین انقلاب صنعتی: پانزدهمین کنفرانس جهانی IFIP WG ، WISE 2022 ، کپنهاگ ، دانمارک ، ... و فناوری ارتباطات ، 650)
سری :
نویسندگان : Lynette Drevin (editor), Natalia Miloslavskaya (editor), Wai Sze Leung (editor), Suné von Solms (editor)
ناشر : Springer
سال نشر : 2022
تعداد صفحات : 137
ISBN (شابک) : 3031081714 , 9783031081712
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 7 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Preface
Organization
Contents
Securing the Fourth Industrial Revolution Through Programming
Analyzing Error Rates in Cryptological Programming Assignments
1 Introduction
2 Background
2.1 Automatic Software Evaluation System
2.2 Java Tests and Cryptology
3 Setup of the Study
3.1 Background and Assignment Selection
3.2 Formalization
4 Results
5 Discussion and Conclusion
References
SecTutor: An Intelligent Tutoring System for Secure Programming
1 Introduction
1.1 Background
1.2 The Focus of the Tool
1.3 Why Create the Tool?
1.4 What Does This Project Propose?
1.5 The Purpose of the Tool
1.6 Related Tools
2 Layout
2.1 How is the Tool Intelligent?
2.2 The Student\'s Point of View
2.3 The Teacher\'s Point of View
3 Conclusion
References
Cybersecurity in the Fourth Industrial Revolution: Charting the Way Forward in Education
How to Overcome Staff Shortage in Professionals for SOCs and NSICs
1 Introduction
2 Related Work
3 Labor Functions of NSIC Personnel
4 Staff Roles of the State System for the Detection and Prevention of Computer Attacks
5 NSIC Personnel Competencies
6 Mephi’s Readiness to Implement a Master’s Degree Programme for Training Personnel for NSICS
7 Conclusion
References
Collaborative Cybersecurity Learning: Establishing Educator and Learner Expectations and Requirements
1 Introduction
2 Approach
3 Surveying Cybersecurity Educators and Learners
4 Workshop-Based Exploration
4.1 Interpreting Cybersecurity
4.2 Delivering Cybersecurity Education
4.3 Reflecting on Existing Approaches
4.4 Looking Ahead
5 Analysis and Discussion
6 Conclusion and Recommendations
References
A Maturity Assessment Model for Cyber Security Education in Europe
1 Introduction
2 Review of Existing Maturity Assessment Models
2.1 Maturity Assessment Models: A Definition
2.2 History and Development of Maturity Assessment Models
2.3 Characteristics of Maturity Assessment Models
2.4 The e-Learning Maturity Model
2.5 The Cybersecurity Capability Maturity Model
3 Maturity Evaluation of Cyber Security Education
3.1 Proposed Domains and Parameters
3.2 Proposed Levels of Maturity
3.3 Validation and Evaluation
4 Knowledge Units
4.1 A CyberSecurity Education Framework
4.2 Known Issues and Pivotal Decisions
5 Conclusion
References
Real-World Cybersecurity-Inspired Capacity Building
ForCyRange: An Educational IoT Cyber Range for Live Digital Forensics
1 Introduction
2 Background and Related Work
2.1 Internet of Things (IoT)
2.2 Digital Forensics, IoT Forensics and Live Digital Forensics
2.3 Cyber Ranges
2.4 Related Work
3 ForCyRange Concept
3.1 Target Group and Learning Objectives
3.2 Proposed Design
3.3 Classification of the Concept
4 Illustrative Scenario: OutSmart-The-Burglar
4.1 Storyline of the Scenario
4.2 Environment
4.3 Learning
5 Conclusion and Future Work
References
South Africa’s Taxi Industry as a Cybersecurity-Awareness Game Changer: Why and How?
1 Introduction
2 The Need for Innovative, Broad-Based Cybersecurity Awareness Initiatives in South Africa
2.1 South Africa as a Technologically Advanced and Connected Continental Leader
2.2 Cyber Insecurity and the South African Threat Landscape
2.3 Assessing South Africa’s National Cybersecurity Maturity
2.4 Defining and Appraising South Africa’s Public Cybersecurity Awareness (as Part of ‘National Cybersecurity’ Maturity)
3 Requirements for Effective Broad-Based Cybersecurity Awareness Campaign (in the South Africa Context)
4 Why the South African Minibus Taxi Industry with a WiFi Offering Could Be a Game Changer
5 International Experience: The Use of Public Transport for Cybersecurity Awareness
6 How Can the South African Minibus Taxi Industry Be a Game Changer?
7 Initial Security Considerations
7.1 Socio-Technical Nature of Cybersecurity
7.2 WiFi Networks’ Vulnerability for Exploitation and the Cybersecurity Paradox
7.3 The Need for TICAC’s Progressive Maturing
8 Conclusion
References
Maritime Cyber Threats Detection Framework: Building Capabilities
1 Introduction
2 Literature Review
3 Maritime Cyber Threats Detection Framework
3.1 Description of the Framework
3.2 Detection Aspects Across the NIST Cybersecurity Framework
3.3 Maritime Domain Identification
3.4 Maritime Cyber Threat Landscape
3.5 Cybersecurity-Aware Maritime Roles and Cyber Threats Detection Capabilities Development
4 Cyber Threats Detection Training Activity
4.1 Training Platform – High-Level Architecture
4.2 Description of Training Activity
4.3 Cyber Threats Attack Scenario
5 Conclusion
References
Author Index