Innovation in cybersecurity education / Kevin Daimi, Guillermo Francia III, editors.

This book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security,...

Full description

Saved in:
Bibliographic Details
Other Authors: Daimi, Kevin, Francia, Guillermo
Format: Ebook
Language:English
Published: Cham : Springer, 2020.
Subjects:
Online Access:Springer eBooks

MARC

LEADER 00000czm a2200000 i 4500
005 20230412155555.0
006 m o d
007 cr |n|||||||||
008 201124s2020 sz o 000 0 eng d
011 |a Z3950 Search: @or @attr 1=7 "9783030502430" @attr 1=7 "9783030502447" 
011 |a Z3950 Record: 0 of 8 
020 |a 3030502430  |q Internet 
020 |a 9783030502430  |q Internet 
020 |a 3030502449  |q Internet 
020 |a 9783030502447  |q Internet 
035 |a (OCoLC)1224141509 
035 |a (EDS)EDS27202159 
037 |a 6404819  |b Proquest Ebook Central 
040 |a YDX  |b eng  |e rda  |c YDX  |d GW5XE  |d EBLCP  |d OCLCO  |d LEATE  |d S2H  |d OCLCF  |d TEU  |d OCL  |d N$T  |d GPRCL  |d OCLCQ  |d COM  |d Z5A 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
099 |a 005.8 INN 
245 0 0 |a Innovation in cybersecurity education /  |c Kevin Daimi, Guillermo Francia III, editors. 
264 1 |a Cham :  |b Springer,  |c 2020. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Intro -- Preface -- Acknowledgments -- Contents -- About the Editors -- Part I Student Learning -- Dynamic Difficulty Adjustment in Cybersecurity Awareness Games -- 1 Introduction -- 2 Dynamic Difficulty Adjustment -- 3 Electroencephalography -- 4 Research Questions -- 5 Methods -- 6 Population -- 7 Difficulty Scaling -- 8 Results -- 9 Future Work -- References -- SMAD: A Configurable and Extensible Low-Level System Monitoring and Anomaly Detection Framework -- 1 Introduction -- 2 Related Work -- 3 SMAD: System Monitoring and Anomaly Detection Framework -- Sysdig Overview -- 
505 8 |a SMAD in a Nutshell -- SMAD Components -- Monitoring Sensor Component -- User Interface Component -- 4 SMAD Experimental Evaluation -- Stress Testing -- Functionality Testing -- Vulnerability Assessment -- 5 SMAD Role in Cybersecurity Education -- SMAD in Formal Education -- Scenario 1: Capture the Intruder (Level of Difficulty-Easy) -- Scenario 2: Red/Blue Team Exercise (Level of Difficulty-Medium) -- Scenario 3: Dissection of Malware (Level of Difficulty-High) -- Scenario 4: Extending SMAD (Level of Difficulty-High) -- SMAD in Nonformal Education -- SMAD-Based Security Monitoring Tutorials -- 
505 8 |a SMAD Interest Communities -- 6 Conclusion -- References -- Thinking Outside the Box: Using Escape Room Games to Increase Interest in Cyber Security -- 1 Background -- 2 Escape Room Mutations -- 3 Skills Learned -- 4 Teaching Strategies -- 5 Related Research -- 6 The Puzzles and Their Secrets -- Puzzle 1: Briefcase Trespass -- Puzzle 2: A Locked Wallet -- Puzzle 3: Laptop Break-in -- Puzzle 4: Phone Phreak -- Puzzle 5: Orange We Having Fun? -- Puzzle 6: Ride the Rails -- Puzzle 7: Alphabet Soup -- 7 Game Setup and Hiding Clues -- 8 Playing the Game -- 9 Conclusions -- References -- 
505 8 |a Information Visualization as a Method for Cybersecurity Education -- 1 Introduction -- 2 Cognitive Principles -- 3 Instructional Design Considerations -- 4 Visualization and Cybersecurity -- 5 Cybersecurity Learning Through InfoVis -- Visual Knowledge Explorer (VKE) -- BubbleNet -- References -- Part II Curriculum Development -- How to Prevent Your Smart Home Device from Turninginto a Weapon -- 1 Introduction to Smart Home Device Security -- Weaponizing Smart Home Devices -- 2 Project Goals -- What to Purchase -- 3 Methodology -- Phase 1: Raspberry Pi Configuration and Sensor Integration -- 
505 8 |a Phase 2: Text When Tripped Program -- Phase 3: Capturing Network Traffic -- Phase 4: Monitor for Deviant Traffic -- 4 Summary -- References -- Puzzle-Based Honors Cybersecurity Course for Critical Thinking Development -- 1 Introduction -- 2 Course Development -- Curriculum Guidelines -- Course Learning Objectives -- Course Learning Outcomes -- Alignment with Program Objectives -- Course Schedule -- Course Grading -- Classroom Sessions -- Puzzle Selection -- 3 Course Topics -- Course Introduction -- Corner to Corner -- Building Height and Barometer -- Nim -- Puzzle Survey -- Three Milk Jugs. 
520 |a This book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security, Data Security, Operating Systems Security, Security Countermeasures, Database Security, Cloud Computing Security, Industrial Control and Embedded Systems Security, Cryptography, and Hardware and Supply Chain Security. The book introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their security knowledge. Further, it provides a glimpse of future directions where cybersecurity techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity experts in the listed fields and edited by prominent cybersecurity researchers and specialists. Discusses various techniques, methods, and approaches adopted by cybersecurity experts in the field; Provides detailed explanation of the cybersecurity concepts that are aptly reinforced by practical examples; Includes a road map of future trends that are suitable for innovative security education and training. 
588 |a Machine converted from AACR2 source record. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed February 9, 2021). 
650 0 |a Computer security  |x Study and teaching.  |9 672590 
700 1 |a Daimi, Kevin.  |9 892893 
700 1 |a Francia, Guillermo.  |9 940330 
776 0 8 |i Print version:  |z 3030502430  |z 9783030502430  |w (OCoLC)1154859866 
776 1 8 |w (OCoLC)1224363873  |w (OCoLC)1225199657  |w (OCoLC)1235863016  |w (OCoLC)1287026453  |w (OCoLC)1287096333 
856 4 0 |u https://ezproxy.aut.ac.nz/login?url=https://link.springer.com/10.1007/978-3-030-50244-7  |z Springer eBooks  |x TEMPORARY ERM URL 
942 |c EB  |n 0 
999 |c 1606735  |d 1606735 
Availability
Requests
Request this item Request this AUT item so you can pick it up when you're at the library.
Interlibrary Loan With Interlibrary Loan you can request the item from another library. It's a free service.