Skip to main content

2015 | OriginalPaper | Buchkapitel

Theoretical Foundations for Developing Cybersecurity Training

verfasst von : Eric C. Ortiz, Lauren Reinerman-Jones

Erschienen in: Virtual, Augmented and Mixed Reality

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cybersecurity is a computer term regarding the detection, anticipation, and prevention of computer technologies and peripherals from damage, attack, or unauthorized access. These technologies include the monitoring of networks, programs, applications, and personnel. Cybersecurity can be viewed from both an offensive or defensive posture involving maintaining and proactively assessing security vulnerabilities. In 2013, Edward Snowden used his position as an infrastructure analyst to leak thousands of top-secret classified documents detailing the U.S. Government’s global covert surveillance and eavesdropping undertakings to the public. This incident identified the human threat as a contributing factor that highlighted several weaknesses in the present state of U.S. cybersecurity affairs. In efforts to strengthen cyber defenses, a solid theoretical research foundation regarding cyber vulnerabilities is warranted. Building upon that foundation, training and experimentation can provide insight into current cybersecurity training methods and how they can be transitioned and implemented into future training regimens.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Greenwald, G., MacAskill, E., Poitras, L.: Edward Snowden: the whistleblower behind the NSA surveillance revelations. The Guardian 11 June 2013 Greenwald, G., MacAskill, E., Poitras, L.: Edward Snowden: the whistleblower behind the NSA surveillance revelations. The Guardian 11 June 2013
2.
Zurück zum Zitat Hansen, L., Nissenbaum, H.: Digital disaster, cyber security, and the copenhagen school. Int. Stud. Quart. 53(4), 1155–1175 (2009)CrossRef Hansen, L., Nissenbaum, H.: Digital disaster, cyber security, and the copenhagen school. Int. Stud. Quart. 53(4), 1155–1175 (2009)CrossRef
4.
Zurück zum Zitat Managing Information Security Risk, U.S. Department of Commerce, Gaithersburg (2011) Managing Information Security Risk, U.S. Department of Commerce, Gaithersburg (2011)
6.
Zurück zum Zitat Vacca, J.R.: Guarding against network intrusion. In: Computer and Information Security Handbook, pp. 86–87. Elsevier, Waltham (2013) Vacca, J.R.: Guarding against network intrusion. In: Computer and Information Security Handbook, pp. 86–87. Elsevier, Waltham (2013)
7.
Zurück zum Zitat Patriciu, V.-V., Furtuna, A.C.: Guide for designing cyber security exercises. In: Proceedings of the 8th WSEAS International Conference on E-Activities and Information Security and Privacy (2009) Patriciu, V.-V., Furtuna, A.C.: Guide for designing cyber security exercises. In: Proceedings of the 8th WSEAS International Conference on E-Activities and Information Security and Privacy (2009)
8.
Zurück zum Zitat Munir, A., Lukman, S., Muhammad, K., Al-Maimani, M.: Human errors in information security. Int. J. 1(3), (2012) Munir, A., Lukman, S., Muhammad, K., Al-Maimani, M.: Human errors in information security. Int. J. 1(3), (2012)
9.
Zurück zum Zitat Kenyon, H.: SMBs Ignoring Insider Threats. InformationWeek, 23 June 2014 Kenyon, H.: SMBs Ignoring Insider Threats. InformationWeek, 23 June 2014
10.
Zurück zum Zitat Greitzer, F.L., Moore, A.P., Cappelli, D.M., Andrews, D.H., Carroll, L.A., Hull, T.D.: Combating the insider cyber threat. Secur. Priv. IEEE 6(1), 61–64 (2008)CrossRef Greitzer, F.L., Moore, A.P., Cappelli, D.M., Andrews, D.H., Carroll, L.A., Hull, T.D.: Combating the insider cyber threat. Secur. Priv. IEEE 6(1), 61–64 (2008)CrossRef
11.
Zurück zum Zitat Hald, S.L., Pedersen, J.M.: An updated taxonomy for characterizing hackers according to thier threat properties. In: 2012 14th International Conference on Advanced Communication Technology (ICACT). IEEE (2012) Hald, S.L., Pedersen, J.M.: An updated taxonomy for characterizing hackers according to thier threat properties. In: 2012 14th International Conference on Advanced Communication Technology (ICACT). IEEE (2012)
12.
13.
Zurück zum Zitat Cox, E.: Ahmed Al-Khabaz expelled from Dawson College after finding security flaw. National Post, 20 January 2013 Cox, E.: Ahmed Al-Khabaz expelled from Dawson College after finding security flaw. National Post, 20 January 2013
14.
Zurück zum Zitat Statement Before the Senate Appropriations Committee. The Federal Bureau of Investigation, 12 June 2013 Statement Before the Senate Appropriations Committee. The Federal Bureau of Investigation, 12 June 2013
15.
Zurück zum Zitat Lynn, W.J.: Defending a new domain: the pentagon’s cyberstrategy. Foreign Aff. 89(5), 101 (2010) Lynn, W.J.: Defending a new domain: the pentagon’s cyberstrategy. Foreign Aff. 89(5), 101 (2010)
16.
Zurück zum Zitat Harris, E.A.: Target Executive Resigns After Breach. The New York Times, 5 March 2014 Harris, E.A.: Target Executive Resigns After Breach. The New York Times, 5 March 2014
17.
Zurück zum Zitat Platsis, G.: The Real Vulnerability of the Cyberworld: You and I, Adelphi (2015) Platsis, G.: The Real Vulnerability of the Cyberworld: You and I, Adelphi (2015)
18.
Zurück zum Zitat Roman, J.: Cost of Mitigating the Insider Threat (2013) Roman, J.: Cost of Mitigating the Insider Threat (2013)
19.
Zurück zum Zitat Stanescu, I.A., Stefan, A.: Interoperability in serious games. In: The 7th International Scientific Conference eLearning and Software for Education, Bucharest (2011) Stanescu, I.A., Stefan, A.: Interoperability in serious games. In: The 7th International Scientific Conference eLearning and Software for Education, Bucharest (2011)
21.
Zurück zum Zitat SIMTRAY, University of Maryland University College, 2014. Accessed 16 February 2015 SIMTRAY, University of Maryland University College, 2014. Accessed 16 February 2015
22.
Zurück zum Zitat Stewart, K.E., Humphries, J.W., Andel, T.R.: Developing a virtualization platform for courses in networking, systems administration and cyber security education. In: Proceedings of the 2009 Spring Simulation Multiconference (2009) Stewart, K.E., Humphries, J.W., Andel, T.R.: Developing a virtualization platform for courses in networking, systems administration and cyber security education. In: Proceedings of the 2009 Spring Simulation Multiconference (2009)
23.
Zurück zum Zitat Williams, C., Meinel, C.: Online assessment for hands-on cyber security training in a virtual lab. In: Global Engineering Education Conference (EDUCON). IEEE (2012) Williams, C., Meinel, C.: Online assessment for hands-on cyber security training in a virtual lab. In: Global Engineering Education Conference (EDUCON). IEEE (2012)
24.
Zurück zum Zitat Sawyer, B.D., Finomore, V.S., Funke, G.J., Mancuso, V.F., Funke, M.E., Matthews, G., Warm, J.S.: Cyber vigilance: effects of signal probability and event rate. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting (2014) Sawyer, B.D., Finomore, V.S., Funke, G.J., Mancuso, V.F., Funke, M.E., Matthews, G., Warm, J.S.: Cyber vigilance: effects of signal probability and event rate. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting (2014)
Metadaten
Titel
Theoretical Foundations for Developing Cybersecurity Training
verfasst von
Eric C. Ortiz
Lauren Reinerman-Jones
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-21067-4_49

Neuer Inhalt