Local cover image
Local cover image

Innovation in cybersecurity education Kevin Daimi, Guillermo Francia III, editors.

Contributor(s): Material type: TextTextPublication details: Cham Springer 2020Description: 391 pages illus. 29 cmISBN:
  • 9783030502447
  • 9783030502430
Subject(s): DDC classification:
  • 005.8 DAI
Contents:
Intro -- Preface -- Acknowledgments -- Contents -- About the Editors -- Part I Student Learning -- Dynamic Difficulty Adjustment in Cybersecurity Awareness Games -- 1 Introduction -- 2 Dynamic Difficulty Adjustment -- 3 Electroencephalography -- 4 Research Questions -- 5 Methods -- 6 Population -- 7 Difficulty Scaling -- 8 Results -- 9 Future Work -- References -- SMAD: A Configurable and Extensible Low-Level System Monitoring and Anomaly Detection Framework -- 1 Introduction -- 2 Related Work -- 3 SMAD: System Monitoring and Anomaly Detection Framework -- Sysdig Overview SMAD in a Nutshell -- SMAD Components -- Monitoring Sensor Component -- User Interface Component -- 4 SMAD Experimental Evaluation -- Stress Testing -- Functionality Testing -- Vulnerability Assessment -- 5 SMAD Role in Cybersecurity Education -- SMAD in Formal Education -- Scenario 1: Capture the Intruder (Level of Difficulty-Easy) -- Scenario 2: Red/Blue Team Exercise (Level of Difficulty-Medium) -- Scenario 3: Dissection of Malware (Level of Difficulty-High) -- Scenario 4: Extending SMAD (Level of Difficulty-High) -- SMAD in Nonformal Education -- SMAD-Based Security Monitoring Tutorials SMAD Interest Communities -- 6 Conclusion -- References -- Thinking Outside the Box: Using Escape Room Games to Increase Interest in Cyber Security -- 1 Background -- 2 Escape Room Mutations -- 3 Skills Learned -- 4 Teaching Strategies -- 5 Related Research -- 6 The Puzzles and Their Secrets -- Puzzle 1: Briefcase Trespass -- Puzzle 2: A Locked Wallet -- Puzzle 3: Laptop Break-in -- Puzzle 4: Phone Phreak -- Puzzle 5: Orange We Having Fun? -- Puzzle 6: Ride the Rails -- Puzzle 7: Alphabet Soup -- 7 Game Setup and Hiding Clues -- 8 Playing the Game -- 9 Conclusions -- References Information Visualization as a Method for Cybersecurity Education -- 1 Introduction -- 2 Cognitive Principles -- 3 Instructional Design Considerations -- 4 Visualization and Cybersecurity -- 5 Cybersecurity Learning Through InfoVis -- Visual Knowledge Explorer (VKE) -- BubbleNet -- References -- Part II Curriculum Development -- How to Prevent Your Smart Home Device from Turninginto a Weapon -- 1 Introduction to Smart Home Device Security -- Weaponizing Smart Home Devices -- 2 Project Goals -- What to Purchase -- 3 Methodology -- Phase 1: Raspberry Pi Configuration and Sensor Integration Phase 2: Text When Tripped Program -- Phase 3: Capturing Network Traffic -- Phase 4: Monitor for Deviant Traffic -- 4 Summary -- References -- Puzzle-Based Honors Cybersecurity Course for Critical Thinking Development -- 1 Introduction -- 2 Course Development -- Curriculum Guidelines -- Course Learning Objectives -- Course Learning Outcomes -- Alignment with Program Objectives -- Course Schedule -- Course Grading -- Classroom Sessions -- Puzzle Selection -- 3 Course Topics -- Course Introduction -- Corner to Corner -- Building Height and Barometer -- Nim -- Puzzle Survey -- Three Milk Jugs
Summary: This book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security, Data Security, Operating Systems Security, Security Countermeasures, Database Security, Cloud Computing Security, Industrial Control and Embedded Systems Security, Cryptography, and Hardware and Supply Chain Security. The book introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their security knowledge. Further, it provides a glimpse of future directions where cybersecurity techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity experts in the listed fields and edited by prominent cybersecurity researchers and specialists. Discusses various techniques, methods, and approaches adopted by cybersecurity experts in the field; Provides detailed explanation of the cybersecurity concepts that are aptly reinforced by practical examples; Includes a road map of future trends that are suitable for innovative security education and training.
List(s) this item appears in: STEM & ENGINEERING CORNER
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books CamTech Library STEM & Engineering 005.8 DAI (Browse shelf(Opens below)) 1 Available CamTech 000781

Includes bibliographical references and index (p. 375-391)

Intro --
Preface --
Acknowledgments --
Contents --
About the Editors --
Part I Student Learning --
Dynamic Difficulty Adjustment in Cybersecurity Awareness Games --
1 Introduction --
2 Dynamic Difficulty Adjustment --
3 Electroencephalography --
4 Research Questions --
5 Methods --
6 Population --
7 Difficulty Scaling --
8 Results --
9 Future Work --
References --
SMAD: A Configurable and Extensible Low-Level System Monitoring and Anomaly Detection Framework --
1 Introduction --
2 Related Work --
3 SMAD: System Monitoring and Anomaly Detection Framework --
Sysdig Overview SMAD in a Nutshell --
SMAD Components --
Monitoring Sensor Component --
User Interface Component --
4 SMAD Experimental Evaluation --
Stress Testing --
Functionality Testing --
Vulnerability Assessment --
5 SMAD Role in Cybersecurity Education --
SMAD in Formal Education --
Scenario 1: Capture the Intruder (Level of Difficulty-Easy) --
Scenario 2: Red/Blue Team Exercise (Level of Difficulty-Medium) --
Scenario 3: Dissection of Malware (Level of Difficulty-High) --
Scenario 4: Extending SMAD (Level of Difficulty-High) --
SMAD in Nonformal Education --
SMAD-Based Security Monitoring Tutorials SMAD Interest Communities --
6 Conclusion --
References --
Thinking Outside the Box: Using Escape Room Games to Increase Interest in Cyber Security --
1 Background --
2 Escape Room Mutations --
3 Skills Learned --
4 Teaching Strategies --
5 Related Research --
6 The Puzzles and Their Secrets --
Puzzle 1: Briefcase Trespass --
Puzzle 2: A Locked Wallet --
Puzzle 3: Laptop Break-in --
Puzzle 4: Phone Phreak --
Puzzle 5: Orange We Having Fun? --
Puzzle 6: Ride the Rails --
Puzzle 7: Alphabet Soup --
7 Game Setup and Hiding Clues --
8 Playing the Game --
9 Conclusions --
References Information Visualization as a Method for Cybersecurity Education --
1 Introduction --
2 Cognitive Principles --
3 Instructional Design Considerations --
4 Visualization and Cybersecurity --
5 Cybersecurity Learning Through InfoVis --
Visual Knowledge Explorer (VKE) --
BubbleNet --
References --
Part II Curriculum Development --
How to Prevent Your Smart Home Device from Turninginto a Weapon --
1 Introduction to Smart Home Device Security --
Weaponizing Smart Home Devices --
2 Project Goals --
What to Purchase --
3 Methodology --
Phase 1: Raspberry Pi Configuration and Sensor Integration Phase 2: Text When Tripped Program --
Phase 3: Capturing Network Traffic --
Phase 4: Monitor for Deviant Traffic --
4 Summary --
References --
Puzzle-Based Honors Cybersecurity Course for Critical Thinking Development --
1 Introduction --
2 Course Development --
Curriculum Guidelines --
Course Learning Objectives --
Course Learning Outcomes --
Alignment with Program Objectives --
Course Schedule --
Course Grading --
Classroom Sessions --
Puzzle Selection --
3 Course Topics --
Course Introduction --
Corner to Corner --
Building Height and Barometer --
Nim --
Puzzle Survey --
Three Milk Jugs

This book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security, Data Security, Operating Systems Security, Security Countermeasures, Database Security, Cloud Computing Security, Industrial Control and Embedded Systems Security, Cryptography, and Hardware and Supply Chain Security. The book introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their security knowledge. Further, it provides a glimpse of future directions where cybersecurity techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity experts in the listed fields and edited by prominent cybersecurity researchers and specialists. Discusses various techniques, methods, and approaches adopted by cybersecurity experts in the field; Provides detailed explanation of the cybersecurity concepts that are aptly reinforced by practical examples; Includes a road map of future trends that are suitable for innovative security education and training.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image