skip to main content
10.1145/3617650.3624923acmconferencesArticle/Chapter ViewAbstractPublication PagescompedConference Proceedingsconference-collections
extended-abstract

Improving Undergraduate Learner's Cyber Security Vulnerability Analysis Skills

Published:05 December 2023Publication History

ABSTRACT

Due to increasing cyber crimes, cyber security analyst and problem solvers are in huge demand. These designations entail certain skills which an individual needs to acquire such as analyzing logs, system debugging etc. Through teacher-student interviews it has been evident that students fail to analyze cyber-attacks. There is a need to train students on vulnerability analysis with respect to cyber attacks. Causal reasoning being one of the crucial skill for solving cyber problems, educating college students towards becoming effective Cyber Security analysts has become a daunting task due the immense breadth of knowledge students need to acquire. This research work aims to propose a two step solution that can help improve students problem analysis skill through causal reasoning and log analysis.

References

  1. Sun, W. (2010, April). Experiences from a Time-Condensed Computer Security Class. In 2010 Seventh International Conference on Information Technology: New Generations (pp. 482--487). IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Micco, M., & Rossman, H. (2002, February). Building a cyberwar lab: lessons learned: teaching cybersecurity principles to undergraduates. In ACM SIGCYBER SECURITYE Bulletin (Vol. 34, No. 1, pp. 23--27). ACM.Google ScholarGoogle Scholar
  3. Xu, J., Yuan, X., Yu, A., Kim, J. H., Kim, T., & Zhang, J. (2016, October). Developing and evaluating a hands-on lab for teaching local area network vulnerabilities. In 2016 IEEE Frontiers in Education Conference (FIE) (pp. 1--4). IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Joshi, A., Ramani, V., Murali, H., Krishnan, R., Mithra, Z., & Pavithran, V. (2012, January). Student-centric design for Cyber Security knowledge empowerment. In 2012 IEEE International Conference on Technology Enhanced Education (ICTEE) (pp. 1--4). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  5. Tunc, C., Hariri, S., Montero, F. D. L. P., Fargo, F., Satam, P., & Al-Nashif, Y. (2015, September). Teaching and Training Cybersecurity as a Cloud Service. In 2015 International Conference on Cloud and Autonomic Computing (pp. 302- 308). IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Weiss, R. S., Boesen, S., Sullivan, J. F., Locasto, M. E., Mache, J., & Nilsen, E. (2015, February). Teaching cybersecurity analysis skills in the cloud. In Proceedings of the 46th ACM Technical Symposium on Computer Science Education (pp. 332--337). ACM.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Pan, Y., Schwartz, D., & Mishra, S. (2015, March). Gamified digital forensiCyber Security course modules for undergraduates. In 2015 IEEE Integrated STEM Education Conference (pp. 100--105). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  8. Andreatos, A. S. (2017, April). Designing educational scenarios to teach network security. In 2017 IEEE Global Engineering Education Conference (EDUCON) (pp. 1606--1610). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  9. Jonassen, David. ''Supporting problem solving in PBL.'' Interdisciplinary Journal of Problem-Based Learning 5, no. 2 (2011): 95--119.Google ScholarGoogle Scholar
  10. Angelini, M., Blasilli, G., Catarci, T., Lenti, S., & Santucci, G. (2018). Vulnus: Visual vulnerability analysis for network security. IEEE transactions on visualization and computer graphics, 25(1), 183--192.Google ScholarGoogle Scholar

Index Terms

  1. Improving Undergraduate Learner's Cyber Security Vulnerability Analysis Skills

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CompEd 2023: Proceedings of the ACM Conference on Global Computing Education Vol 2
      December 2023
      50 pages
      ISBN:9798400703744
      DOI:10.1145/3617650

      Copyright © 2023 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 5 December 2023

      Check for updates

      Qualifiers

      • extended-abstract

      Acceptance Rates

      Overall Acceptance Rate33of100submissions,33%
    • Article Metrics

      • Downloads (Last 12 months)26
      • Downloads (Last 6 weeks)3

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader