000 05130nam a22002657a 4500
003 OSt
005 20220517030051.0
008 220517b |||||||| |||| 00| 0 eng d
020 _a9783030502447
020 _a9783030502430
040 _c0
082 _a005.8 DAI
092 _20
245 _aInnovation in cybersecurity education
_cKevin Daimi, Guillermo Francia III, editors.
260 _aCham
_bSpringer
_c2020
300 _a391 pages
_billus.
_c29 cm
504 _aIncludes bibliographical references and index (p. 375-391)
505 _a Intro -- Preface -- Acknowledgments -- Contents -- About the Editors -- Part I Student Learning -- Dynamic Difficulty Adjustment in Cybersecurity Awareness Games -- 1 Introduction -- 2 Dynamic Difficulty Adjustment -- 3 Electroencephalography -- 4 Research Questions -- 5 Methods -- 6 Population -- 7 Difficulty Scaling -- 8 Results -- 9 Future Work -- References -- SMAD: A Configurable and Extensible Low-Level System Monitoring and Anomaly Detection Framework -- 1 Introduction -- 2 Related Work -- 3 SMAD: System Monitoring and Anomaly Detection Framework -- Sysdig Overview SMAD in a Nutshell -- SMAD Components -- Monitoring Sensor Component -- User Interface Component -- 4 SMAD Experimental Evaluation -- Stress Testing -- Functionality Testing -- Vulnerability Assessment -- 5 SMAD Role in Cybersecurity Education -- SMAD in Formal Education -- Scenario 1: Capture the Intruder (Level of Difficulty-Easy) -- Scenario 2: Red/Blue Team Exercise (Level of Difficulty-Medium) -- Scenario 3: Dissection of Malware (Level of Difficulty-High) -- Scenario 4: Extending SMAD (Level of Difficulty-High) -- SMAD in Nonformal Education -- SMAD-Based Security Monitoring Tutorials SMAD Interest Communities -- 6 Conclusion -- References -- Thinking Outside the Box: Using Escape Room Games to Increase Interest in Cyber Security -- 1 Background -- 2 Escape Room Mutations -- 3 Skills Learned -- 4 Teaching Strategies -- 5 Related Research -- 6 The Puzzles and Their Secrets -- Puzzle 1: Briefcase Trespass -- Puzzle 2: A Locked Wallet -- Puzzle 3: Laptop Break-in -- Puzzle 4: Phone Phreak -- Puzzle 5: Orange We Having Fun? -- Puzzle 6: Ride the Rails -- Puzzle 7: Alphabet Soup -- 7 Game Setup and Hiding Clues -- 8 Playing the Game -- 9 Conclusions -- References Information Visualization as a Method for Cybersecurity Education -- 1 Introduction -- 2 Cognitive Principles -- 3 Instructional Design Considerations -- 4 Visualization and Cybersecurity -- 5 Cybersecurity Learning Through InfoVis -- Visual Knowledge Explorer (VKE) -- BubbleNet -- References -- Part II Curriculum Development -- How to Prevent Your Smart Home Device from Turninginto a Weapon -- 1 Introduction to Smart Home Device Security -- Weaponizing Smart Home Devices -- 2 Project Goals -- What to Purchase -- 3 Methodology -- Phase 1: Raspberry Pi Configuration and Sensor Integration Phase 2: Text When Tripped Program -- Phase 3: Capturing Network Traffic -- Phase 4: Monitor for Deviant Traffic -- 4 Summary -- References -- Puzzle-Based Honors Cybersecurity Course for Critical Thinking Development -- 1 Introduction -- 2 Course Development -- Curriculum Guidelines -- Course Learning Objectives -- Course Learning Outcomes -- Alignment with Program Objectives -- Course Schedule -- Course Grading -- Classroom Sessions -- Puzzle Selection -- 3 Course Topics -- Course Introduction -- Corner to Corner -- Building Height and Barometer -- Nim -- Puzzle Survey -- Three Milk Jugs
520 _aThis book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security, Data Security, Operating Systems Security, Security Countermeasures, Database Security, Cloud Computing Security, Industrial Control and Embedded Systems Security, Cryptography, and Hardware and Supply Chain Security. The book introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their security knowledge. Further, it provides a glimpse of future directions where cybersecurity techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity experts in the listed fields and edited by prominent cybersecurity researchers and specialists. Discusses various techniques, methods, and approaches adopted by cybersecurity experts in the field; Provides detailed explanation of the cybersecurity concepts that are aptly reinforced by practical examples; Includes a road map of future trends that are suitable for innovative security education and training.
650 _aComputer security
_xStudy and teaching.
700 _aDaimi, Kevin
843 _aPhotocopy
887 _2CamTech Library
942 _2ddc
_cBK
_n0
999 _c214
_d214