Cyber Security

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 38922 Experts worldwide ranked by ideXlab platform

Vladimir Janout - One of the best experts on this subject based on the ideXlab platform.

  • Challenges in Cyber Security Education
    International Journal of Information Security and Cybercrime, 2020
    Co-Authors: Sara Ricci, Jan Hajny, Edmundas Piesarskas, Simon Parker, Vladimir Janout
    Abstract:

    Cyber Security education is an important and pertinent topic as it plays a major role in mitigating the risks caused by a global shortage of Cyber Security experts. In order to better support this crucial function, a Cyber Security skills framework needs to be agreed upon by academics in this field, along with an increase in the visibility of Cyber Security education and training. Without these, there is likely to be a long-term shortfall between the number of skilled Cyber Security professionals and demand, potentially leaving organisations, institutions, and governments vulnerable. Our contribution to this challenge is threefold. Firstly this article addresses the development of a Cyber Security skills framework and its applicability. Secondly, we have analysed a sample of 87 study programs in order to produce an overview of Cyber Security topic areas. Moreover, the collected data are visualized in an interactive map, i.e. a dynamic web application with the aim to help students in their search for a Cyber Security study program. Finally, a Cyber Security curricula designer tool is proposed; this application would serve as a guideline for Cyber Security curricula designers.

Gerald L. Kovacich - One of the best experts on this subject based on the ideXlab platform.

  • Determining and Establishing Cyber Security Functions
    The Information Systems Security Officer's Guide, 2016
    Co-Authors: Gerald L. Kovacich
    Abstract:

    We began this section of the book with an overview of the duties and responsibilities of the Cyber Security officer and then discussed establishing a Cyber Security program and the related Cyber Security plans and organization. We will continue the trend to narrow the focus: This chapter describes a process to determine what Cyber Security functions are needed to successfully establish a Cyber Security program and related organization, as well as how to incorporate those functions into the Cyber Security organization's day-to-day level-of-effort work.

  • A Career as a Cyber Security Officer
    The Information Systems Security Officer's Guide, 2016
    Co-Authors: Gerald L. Kovacich
    Abstract:

    The Cyber Security officer professionals of the twenty-first century must possess many skills that differ from those possessed by some current and past Cyber Security officer professionals. In this chapter, the discussion will center on what are the necessary skills that a Cyber Security officer and professional Cyber Security staff should possess to be successful, as well as how to establish and maintain a Cyber Security career development program. 2

  • The Cyber Security Officer’s Position, Duties, and Responsibilities
    The Information Systems Security Officer's Guide, 2016
    Co-Authors: Gerald L. Kovacich
    Abstract:

    The objective of this chapter is to define the role that the Cyber Security officer will play in a corporation or government agency. In this case, it is the role of the Cyber Security officer in an international corporation. The duties and responsibilities of a Cyber Security officer vary depending on the place of employment. However, in this case, we are assuming the Cyber Security officer has the perfect position because it is one all Cyber Security officers should strive to attain in order to “do it right the first time.”

Moises Sudit - One of the best experts on this subject based on the ideXlab platform.

  • Symbolic Reasoning in the Cyber Security Domain
    2007
    Co-Authors: Michael Kandefer, Adam Stotz, Stuart C. Shapiro, Moises Sudit
    Abstract:

    Cyber Security can benefit greatly from the association and combination of data and information from multiple sources. A data repository of system vulnerabilities, a network scanning tool, and the advice of a systems analyst trained in Cyber Security can all aid in identifying and preventing intruders. Previous attempts at information fusion in Cyber Security have largely concerned themselves with the "tangible" information sources, but this ignores an important resource in solving problems in this particular domain --- the Cyber Security expert's reasoning process. The National Center for Information Fusion (NCMIF) has begun implementing a solution that partially automates the Cyber Security expert in the intrusion detection process through a combination of information fusion techniques and symbolic reasoning, using the SNePS knowledge representation, reasoning, and acting system. Our methodology approaches Cyber Security problems by fusing information from external information repositories into a SNePS-based agent‟s knowledge base. We have identified five information sources that are useful: the background knowledge of a Cyber Security subject matter expert (SME); Nessus Security scan reports; the Common Vulnerabilities and Exposures (CVE) database; and INFERD template graphs. The SNePS system makes use of higher-order logic to represent information about the external world. Facts are represented as proposition-valued terms, and the SME‟s reasoning procedures are represented as logical rules.

  • Symbolic Reasoning in the Cyber Security Domain
    2007
    Co-Authors: Michael Kandefer, Adam Stotz, Stuart C. Shapiro, Moises Sudit
    Abstract:

    Cyber Security can benefit greatly from the association and combination of data and information from multiple sources. A data repository of system vulnerabilities, a network scanning tool, and the advice of a systems analyst trained in Cyber Security can all aid in identifying and preventing intruders. Previous attempts at information fusion in Cyber Security have largely concerned themselves with the "tangible" information sources, but this ignores an important resource in solving problems in this particular domain --- the Cyber Security expert's reasoning process. The National Center for Information Fusion (NCMIF) has begun implementing a solution that partially automates the Cyber Security expert in the intrusion detection process through a combination of information fusion techniques and symbolic reasoning, using the SNePS knowledge representation, reasoning, and acting system. Our methodology approaches Cyber Security problems by fusing information from external information repositories into a SNePS-based agent‟s knowledge base. We have identified five information sources that are useful: the background knowledge of a Cyber Security subject matter expert (SME); Nessus Security scan reports; the Common Vulnerabilities and Exposures (CVE) database; and INFERD template graphs. The SNePS system makes use of higher-order logic to represent information about the external world. Facts are represented as proposition-valued terms, and the SME‟s reasoning procedures are represented as logical rules.

Oliver Toskovic - One of the best experts on this subject based on the ideXlab platform.

  • Factors Related to Cyber Security Behavior
    IEEE Access, 2020
    Co-Authors: Ana Kovacevic, Nenad Putnik, Oliver Toskovic
    Abstract:

    Theoretical and empirical insight notes that Cyber Security awareness is a topic of particular interest in Cyber Security. Humans are the central figures in Cyber Security and the way to reduce risk in Cyberspace is to make people more Security aware. While there have been numerous studies about various aspects of Cyber Security awareness, they are both inconsistent and environment-dependent. The main aim of our research is to analyze Cyber Security awareness in depth, and to try to discover how various factors such as socio-demographics, Cyber Security perceptions, previous Cyber Security breaches, IT usage, and knowledge may individually or together impact on Cyber Security behavior. To prove that we conducted our research on students, as they are the most technologically active part of the society. We discovered that knowledge proved to be the dominant factor for Cyber Security awareness, and although students are digital natives, they do not feel safe in the Cyber environment; they do not behave securely and do not have adequate knowledge to protect themselves in Cyberspace.

Sara Ricci - One of the best experts on this subject based on the ideXlab platform.

  • Challenges in Cyber Security Education
    International Journal of Information Security and Cybercrime, 2020
    Co-Authors: Sara Ricci, Jan Hajny, Edmundas Piesarskas, Simon Parker, Vladimir Janout
    Abstract:

    Cyber Security education is an important and pertinent topic as it plays a major role in mitigating the risks caused by a global shortage of Cyber Security experts. In order to better support this crucial function, a Cyber Security skills framework needs to be agreed upon by academics in this field, along with an increase in the visibility of Cyber Security education and training. Without these, there is likely to be a long-term shortfall between the number of skilled Cyber Security professionals and demand, potentially leaving organisations, institutions, and governments vulnerable. Our contribution to this challenge is threefold. Firstly this article addresses the development of a Cyber Security skills framework and its applicability. Secondly, we have analysed a sample of 87 study programs in order to produce an overview of Cyber Security topic areas. Moreover, the collected data are visualized in an interactive map, i.e. a dynamic web application with the aim to help students in their search for a Cyber Security study program. Finally, a Cyber Security curricula designer tool is proposed; this application would serve as a guideline for Cyber Security curricula designers.