ABSTRACT
Due to increasing cyber crimes, cyber security analyst and problem solvers are in huge demand. These designations entail certain skills which an individual needs to acquire such as analyzing logs, system debugging etc. Through teacher-student interviews it has been evident that students fail to analyze cyber-attacks. There is a need to train students on vulnerability analysis with respect to cyber attacks. Causal reasoning being one of the crucial skill for solving cyber problems, educating college students towards becoming effective Cyber Security analysts has become a daunting task due the immense breadth of knowledge students need to acquire. This research work aims to propose a two step solution that can help improve students problem analysis skill through causal reasoning and log analysis.
- Sun, W. (2010, April). Experiences from a Time-Condensed Computer Security Class. In 2010 Seventh International Conference on Information Technology: New Generations (pp. 482--487). IEEE.Google ScholarDigital Library
- Micco, M., & Rossman, H. (2002, February). Building a cyberwar lab: lessons learned: teaching cybersecurity principles to undergraduates. In ACM SIGCYBER SECURITYE Bulletin (Vol. 34, No. 1, pp. 23--27). ACM.Google Scholar
- Xu, J., Yuan, X., Yu, A., Kim, J. H., Kim, T., & Zhang, J. (2016, October). Developing and evaluating a hands-on lab for teaching local area network vulnerabilities. In 2016 IEEE Frontiers in Education Conference (FIE) (pp. 1--4). IEEE.Google ScholarDigital Library
- Joshi, A., Ramani, V., Murali, H., Krishnan, R., Mithra, Z., & Pavithran, V. (2012, January). Student-centric design for Cyber Security knowledge empowerment. In 2012 IEEE International Conference on Technology Enhanced Education (ICTEE) (pp. 1--4). IEEE.Google ScholarCross Ref
- Tunc, C., Hariri, S., Montero, F. D. L. P., Fargo, F., Satam, P., & Al-Nashif, Y. (2015, September). Teaching and Training Cybersecurity as a Cloud Service. In 2015 International Conference on Cloud and Autonomic Computing (pp. 302- 308). IEEE.Google ScholarDigital Library
- Weiss, R. S., Boesen, S., Sullivan, J. F., Locasto, M. E., Mache, J., & Nilsen, E. (2015, February). Teaching cybersecurity analysis skills in the cloud. In Proceedings of the 46th ACM Technical Symposium on Computer Science Education (pp. 332--337). ACM.Google ScholarDigital Library
- Pan, Y., Schwartz, D., & Mishra, S. (2015, March). Gamified digital forensiCyber Security course modules for undergraduates. In 2015 IEEE Integrated STEM Education Conference (pp. 100--105). IEEE.Google ScholarCross Ref
- Andreatos, A. S. (2017, April). Designing educational scenarios to teach network security. In 2017 IEEE Global Engineering Education Conference (EDUCON) (pp. 1606--1610). IEEE.Google ScholarCross Ref
- Jonassen, David. ''Supporting problem solving in PBL.'' Interdisciplinary Journal of Problem-Based Learning 5, no. 2 (2011): 95--119.Google Scholar
- Angelini, M., Blasilli, G., Catarci, T., Lenti, S., & Santucci, G. (2018). Vulnus: Visual vulnerability analysis for network security. IEEE transactions on visualization and computer graphics, 25(1), 183--192.Google Scholar
Index Terms
- Improving Undergraduate Learner's Cyber Security Vulnerability Analysis Skills
Recommendations
Measuring and ranking attacks based on vulnerability analysis
As the number of software vulnerabilities increases, the research on software vulnerabilities becomes a focusing point in information security. A vulnerability could be exploited to attack the information asset with the weakness related to the ...
Government regulations in cyber security: Framework, standards and recommendations
AbstractCyber security refers to the protection of Internet-connected systems, such as hardware, software as well as data (information) from cyber attacks (adversaries). A cyber security regulation is needed in order to protect information ...
Highlights- We list and discuss the cyber attacks, security requirements and measures. We then discuss the cyber security incident management framework and its various ...
History and Future of Automated Vulnerability Analysis
SACMAT '19: Proceedings of the 24th ACM Symposium on Access Control Models and TechnologiesThe software upon which our modern society operates is riddled with security vulnerabilities. These vulnerabilities allow hackers access to our sensitive data and make our system insecure. To identify vulnerabilities in software, human experts, or ...
Comments