CINXE.COM

Search results for: cybersecurity awareness

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: cybersecurity awareness</title> <meta name="description" content="Search results for: cybersecurity awareness"> <meta name="keywords" content="cybersecurity awareness"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="cybersecurity awareness" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="cybersecurity awareness"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 2787</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: cybersecurity awareness</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2787</span> Cybersecurity Awareness Among Applied Sciences Student Population</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sanja%20Bracun">Sanja Bracun</a>, <a href="https://publications.waset.org/abstracts/search?q=Nikolina%20Kasunic"> Nikolina Kasunic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> After graduation, the student population of applied sciences will become the population of employees on IT experts’ positions or "just" business users of certain IT technologies for which the level of awareness of existing cybersecurity risks is extremely important. This research results define the current cybersecurity awareness level of students at Zagreb University of Applied Sciences (TVZ), what can be useful not only for teaching staff to form a curriculum related to cybersecurity more accurately but also to employers to know what to expect from their future employees regarding cybersecurity awareness level. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=student%20population%20cybersecurity%20awareness" title="student population cybersecurity awareness">student population cybersecurity awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness" title=" cybersecurity awareness"> cybersecurity awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=applied%20sciences%20students" title=" applied sciences students"> applied sciences students</a> </p> <a href="https://publications.waset.org/abstracts/150938/cybersecurity-awareness-among-applied-sciences-student-population" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150938.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">253</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2786</span> Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pema%20Choejey">Pema Choejey</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Murray"> David Murray</a>, <a href="https://publications.waset.org/abstracts/search?q=Chun%20Che%20Fung"> Chun Che Fung</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=awareness%20and%20training" title="awareness and training">awareness and training</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20policy" title=" cybersecurity policy"> cybersecurity policy</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20management" title=" risk management"> risk management</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20risks" title=" security risks"> security risks</a> </p> <a href="https://publications.waset.org/abstracts/64789/perceptions-of-cybersecurity-in-government-organizations-case-study-of-bhutan" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/64789.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">345</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2785</span> Understanding the Human Element in Cybersecurity: A Literature Review and Recommendations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sadiq%20Nasir">Sadiq Nasir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The need for strong cybersecurity measures has been brought to light by society's growing reliance on technology. Cybersecurity breaches continue, with the human aspect playing a crucial role, despite the availability of technology remedies. By analyzing the most recent findings in this area of research on awareness, attitudes, and behaviour, this literature review seeks to comprehend the human element in cybersecurity. A thorough overview of the most recent studies and gaps in the body of knowledge will be determined through a systematic examination of the literature. The paper indicates that in order to address the human component in cybersecurity, a socio-technical strategy is required, and it advocates for additional study in order to fully comprehend the consequences of various interventions. The findings of this study will increase our understanding of cybersecurity and have useful ramifications for companies wanting to strengthen their cybersecurity posture. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness" title=" cybersecurity awareness"> cybersecurity awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20factor%20in%20security" title=" human factor in security"> human factor in security</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20security" title=" human security"> human security</a> </p> <a href="https://publications.waset.org/abstracts/162192/understanding-the-human-element-in-cybersecurity-a-literature-review-and-recommendations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162192.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2784</span> Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shaila%20Rana">Shaila Rana</a>, <a href="https://publications.waset.org/abstracts/search?q=Wasim%20Alhamdani"> Wasim Alhamdani </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Effective cybersecurity training is of the utmost importance, given the plethora of attacks that continue to increase in complexity and ubiquity. VR cybersecurity training remains a starkly understudied discipline. Studies that evaluated the effectiveness of VR cybersecurity training over traditional methods are required. An engaging and interactive platform can support knowledge retention of the training material. Consequently, an effective form of cybersecurity training is required to support a culture of cybersecurity awareness. Measurements of effectiveness varied throughout the studies, with surveys and observations being the two most utilized forms of evaluating effectiveness. Further research is needed to evaluate the effectiveness of VR cybersecurity training and traditional training. Additionally, research for evaluating if VR cybersecurity training is more effective than traditional methods is vital. This paper proposes a methodology to compare the two cybersecurity training methods and their effectiveness. The proposed framework includes developing both VR and traditional cybersecurity training methods and delivering them to at least 100 users. A quiz along with a survey will be administered and statistically analyzed to determine if there is a difference in knowledge retention and user satisfaction. The aim of this paper is to bring attention to the need to study VR cybersecurity training and its effectiveness compared to traditional training methods. This paper hopes to contribute to the cybersecurity training field by providing an effective way to train users for security awareness. If VR training is deemed more effective, this could create a new direction for cybersecurity training practices. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=virtual%20reality%20cybersecurity%20training" title="virtual reality cybersecurity training">virtual reality cybersecurity training</a>, <a href="https://publications.waset.org/abstracts/search?q=VR%20cybersecurity%20training" title=" VR cybersecurity training"> VR cybersecurity training</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20cybersecurity%20training" title=" traditional cybersecurity training"> traditional cybersecurity training</a> </p> <a href="https://publications.waset.org/abstracts/132319/exploring-the-need-to-study-the-efficacy-of-vr-training-compared-to-traditional-cybersecurity-training" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/132319.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">215</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2783</span> Cybersecurity Awareness through Laboratories and Cyber Competitions in the Education System: Practices to Promote Student Success</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Haydar%20Teymourlouei">Haydar Teymourlouei </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybersecurity is one of the greatest challenges society faces in an age revolving around technological development. With cyber-attacks on the continuous rise, the nation needs to understand and learn ways that can prevent such attacks. A major contribution that can change the education system is to implement laboratories and competitions into academia. This method can improve and educate students with more hands-on exercises in a highly motivating setting. Considering the fact that students are the next generation of the nation’s workforce, it is important for students to understand concepts not only through books, but also through actual hands-on experiences in order for them to be prepared for the workforce. An effective cybersecurity education system is critical for creating a strong cyber secure workforce today and for the future. This paper emphasizes the need for awareness and the need for competitions and cybersecurity laboratories to be implemented into the education system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=awareness" title="awareness">awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=competition" title=" competition"> competition</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=laboratories" title=" laboratories"> laboratories</a>, <a href="https://publications.waset.org/abstracts/search?q=workforce" title=" workforce"> workforce</a> </p> <a href="https://publications.waset.org/abstracts/43604/cybersecurity-awareness-through-laboratories-and-cyber-competitions-in-the-education-system-practices-to-promote-student-success" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43604.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">334</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2782</span> Cybersecurity Challenges in Africa</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chimmoe%20Fomo%20Michelle%20Larissa">Chimmoe Fomo Michelle Larissa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Africa" title="Africa">Africa</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=challenges" title=" challenges"> challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20infrastructure" title=" digital infrastructure"> digital infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title=" cybercrime"> cybercrime</a> </p> <a href="https://publications.waset.org/abstracts/187065/cybersecurity-challenges-in-africa" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187065.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">40</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2781</span> A Virtual Reality Cybersecurity Training Knowledge-Based Ontology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shaila%20Rana">Shaila Rana</a>, <a href="https://publications.waset.org/abstracts/search?q=Wasim%20Alhamdani"> Wasim Alhamdani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Effective cybersecurity learning relies on an engaging, interactive, and entertaining activity that fosters positive learning outcomes. VR cybersecurity training may promote these aforementioned variables. However, a methodological approach and framework have not yet been created to allow trainers and educators to employ VR cybersecurity training methods to promote positive learning outcomes to the author’s best knowledge. Thus, this paper aims to create an approach that cybersecurity trainers can follow to create a VR cybersecurity training module. This methodology utilizes concepts from other cybersecurity training frameworks, such as NICE and CyTrONE. Other cybersecurity training frameworks do not incorporate the use of VR. VR training proposes unique challenges that cannot be addressed in current cybersecurity training frameworks. Subsequently, this ontology utilizes concepts unique to developing VR training to create a relevant methodology for creating VR cybersecurity training modules. The outcome of this research is to create a methodology that is relevant and useful for designing VR cybersecurity training modules. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=virtual%20reality%20cybersecurity%20training" title="virtual reality cybersecurity training">virtual reality cybersecurity training</a>, <a href="https://publications.waset.org/abstracts/search?q=VR%20cybersecurity%20training" title=" VR cybersecurity training"> VR cybersecurity training</a>, <a href="https://publications.waset.org/abstracts/search?q=traditional%20cybersecurity%20training" title=" traditional cybersecurity training"> traditional cybersecurity training</a>, <a href="https://publications.waset.org/abstracts/search?q=ontology" title=" ontology"> ontology</a> </p> <a href="https://publications.waset.org/abstracts/138790/a-virtual-reality-cybersecurity-training-knowledge-based-ontology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/138790.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">289</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2780</span> Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Norshima%20Humaidi">Norshima Humaidi</a>, <a href="https://publications.waset.org/abstracts/search?q=Saif%20Hussein%20Abdallah%20Alghazo"> Saif Hussein Abdallah Alghazo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=protection%20behaviour" title=" protection behaviour"> protection behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security%20competencies" title=" information security competencies"> information security competencies</a>, <a href="https://publications.waset.org/abstracts/search?q=countermeasure%20awareness" title=" countermeasure awareness"> countermeasure awareness</a> </p> <a href="https://publications.waset.org/abstracts/157751/enhancing-cybersecurity-protective-behaviour-role-of-information-security-competencies-and-procedural-information-security-countermeasure-awareness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/157751.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2779</span> Towards the Management of Cybersecurity Threats in Organisations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=O.%20A.%20Ajigini">O. A. Ajigini</a>, <a href="https://publications.waset.org/abstracts/search?q=E.%20N.%20Mwim"> E. N. Mwim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=confidential%20information" title="confidential information">confidential information</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberattacks" title=" cyberattacks"> cyberattacks</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberspace" title=" cyberspace"> cyberspace</a>, <a href="https://publications.waset.org/abstracts/search?q=sensitive%20information" title=" sensitive information"> sensitive information</a> </p> <a href="https://publications.waset.org/abstracts/62869/towards-the-management-of-cybersecurity-threats-in-organisations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62869.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">259</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2778</span> Cybersecurity Protection Structures: The Case of Lesotho</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20N.%20Mosola">N. N. Mosola</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20F.%20Moeketsi"> K. F. Moeketsi</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20Sehobai"> R. Sehobai</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Pule"> N. Pule</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title="cybercrime">cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20emergency%20response%20team" title=" computer emergency response team"> computer emergency response team</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20security%20incident%20response%20team" title=" computer security incident response team"> computer security incident response team</a> </p> <a href="https://publications.waset.org/abstracts/107166/cybersecurity-protection-structures-the-case-of-lesotho" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/107166.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">156</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2777</span> Cybersecurity Protective Behavior in Industrial Revolution 4.0 Era: A Conceptual Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saif%20Hussein%20Abdallah%20Alghazo">Saif Hussein Abdallah Alghazo</a>, <a href="https://publications.waset.org/abstracts/search?q=Norshima%20Humaidi"> Norshima Humaidi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Adopting cybersecurity protective behaviour among the employees is seriously considered in the organization, especially when the Internet of Things (IoT) is widely used in Industrial Revolution 4.0 (IR 4.0) era. Cybersecurity issues arise due to weaknesses of employees’ behaviour such as carelessness and failure to adopt good practices of information security behaviour. Therefore, this study aims to explore the dimensions that might influence employees’ behaviour to adopt good cybersecurity practices and to develop a new holistic model related to this concept. The study proposed this by reviewing the existing works of literature related to this field extensively, especially by focusing on the existing theory such as Protection Motivation Theory (PMT). Moreover, this study has also explored the role of cybersecurity competency among the security manager in the organization since this construct is essential to enhance the protective behaviour towards cybersecurity among the employees in the organization. The proposed research model is important to be quantitatively tested in the future as the findings will serve as the input to the act that will enhance employee’s cybersecurity protective behaviour in the IR 4.0 environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20protective%20behaviour" title="cybersecurity protective behaviour">cybersecurity protective behaviour</a>, <a href="https://publications.waset.org/abstracts/search?q=protection%20motivation%20theory" title=" protection motivation theory"> protection motivation theory</a>, <a href="https://publications.waset.org/abstracts/search?q=IR%204.0" title=" IR 4.0"> IR 4.0</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20competency" title=" cybersecurity competency"> cybersecurity competency</a> </p> <a href="https://publications.waset.org/abstracts/147859/cybersecurity-protective-behavior-in-industrial-revolution-40-era-a-conceptual-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147859.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">152</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2776</span> Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rossouw%20De%20Bruin">Rossouw De Bruin</a>, <a href="https://publications.waset.org/abstracts/search?q=Sebastiaan%20H.%20Von%20Solms"> Sebastiaan H. Von Solms</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=humanities" title="humanities">humanities</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20governance" title=" cybersecurity governance"> cybersecurity governance</a>, <a href="https://publications.waset.org/abstracts/search?q=maturity" title=" maturity"> maturity</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20maturity" title=" cybersecurity maturity"> cybersecurity maturity</a>, <a href="https://publications.waset.org/abstracts/search?q=maturity%20model" title=" maturity model"> maturity model</a> </p> <a href="https://publications.waset.org/abstracts/58256/cybersecurity-and-governance-for-humanitarian-work-an-approach-for-addressing-security-risks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/58256.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">267</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2775</span> The Nature and Impact of Trojan Horses in Cybersecurity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mehrab%20Faraghti">Mehrab Faraghti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Trojan horses, a form of malware masquerading as legitimate software, pose significant cybersecurity threats. These malicious programs exploit user trust, infiltrate systems, and can lead to data breaches, financial loss, and compromised privacy. This paper explores the mechanisms through which Trojan horses operate, including delivery methods such as phishing and software vulnerabilities. It categorizes various types of Trojan horses and their specific impacts on individuals and organizations. Additionally, the research highlights the evolution of Trojan threats and the importance of user awareness and proactive security measures. By analyzing case studies of notable Trojan attacks, this study identifies common vulnerabilities that can be exploited and offers insights into effective countermeasures, including behavioral analysis, anomaly detection, and robust incident response strategies. The findings emphasize the need for comprehensive cybersecurity education and the implementation of advanced security protocols to mitigate the risks associated with Trojan horses. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Trojan%20horses" title="Trojan horses">Trojan horses</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20breach" title=" data breach"> data breach</a> </p> <a href="https://publications.waset.org/abstracts/193829/the-nature-and-impact-of-trojan-horses-in-cybersecurity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/193829.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">9</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2774</span> Adding Security Blocks to the DevOps Lifecycle</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Andrew%20John%20Zeller">Andrew John Zeller</a>, <a href="https://publications.waset.org/abstracts/search?q=Francis%20Pouatcha"> Francis Pouatcha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security" title="information security">information security</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20security" title=" data security"> data security</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=devOps" title=" devOps"> devOps</a>, <a href="https://publications.waset.org/abstracts/search?q=IT%20management" title=" IT management"> IT management</a> </p> <a href="https://publications.waset.org/abstracts/168996/adding-security-blocks-to-the-devops-lifecycle" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168996.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">116</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2773</span> Strategies and Approaches for Curriculum Development and Training of Faculty in Cybersecurity Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lucy%20Tsado">Lucy Tsado</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As cybercrime and cyberattacks continue to increase, the need to respond will follow suit. When cybercrimes occur, the duty to respond sometimes falls on law enforcement. However, criminal justice students are not taught concepts in cybersecurity and digital forensics. There is, therefore, an urgent need for many more institutions to begin teaching cybersecurity and related courses to social science students especially criminal justice students. However, many faculty in universities, colleges, and high schools are not equipped to teach these courses or do not have the knowledge and resources to teach important concepts in cybersecurity or digital forensics to criminal justice students. This research intends to develop curricula and training programs to equip faculty with the skills to meet this need. There is a current call to involve non-technical fields to fill the cybersecurity skills gap, according to experts. There is a general belief among non-technical fields that cybersecurity education is only attainable within computer science and technologically oriented fields. As seen from current calls, this is not entirely the case. Transitioning into the field is possible through curriculum development, training, certifications, internships and apprenticeships, and competitions. There is a need to identify how a cybersecurity eco-system can be created at a university to encourage/start programs that will lead to an interest in cybersecurity education as well as attract potential students. A short-term strategy can address this problem through curricula development, while a long-term strategy will address developing training faculty to teach cybersecurity and digital forensics. Therefore this research project addresses this overall problem in two parts, through curricula development for the criminal justice discipline; and training of faculty in criminal justice to teaching the important concepts of cybersecurity and digital forensics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20education" title="cybersecurity education">cybersecurity education</a>, <a href="https://publications.waset.org/abstracts/search?q=criminal%20justice" title=" criminal justice"> criminal justice</a>, <a href="https://publications.waset.org/abstracts/search?q=curricula%20development" title=" curricula development"> curricula development</a>, <a href="https://publications.waset.org/abstracts/search?q=nontechnical%20cybersecurity" title=" nontechnical cybersecurity"> nontechnical cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20forensics" title=" digital forensics"> digital forensics</a> </p> <a href="https://publications.waset.org/abstracts/158085/strategies-and-approaches-for-curriculum-development-and-training-of-faculty-in-cybersecurity-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158085.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">105</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2772</span> Towards Resilient Cloud Computing through Cyber Risk Assessment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hilalah%20Alturkistani">Hilalah Alturkistani</a>, <a href="https://publications.waset.org/abstracts/search?q=Alaa%20AlFaadhel"> Alaa AlFaadhel</a>, <a href="https://publications.waset.org/abstracts/search?q=Nora%20AlJahani"> Nora AlJahani</a>, <a href="https://publications.waset.org/abstracts/search?q=Fatiha%20Djebbar"> Fatiha Djebbar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20risk%20management%20plan" title="cybersecurity risk management plan">cybersecurity risk management plan</a>, <a href="https://publications.waset.org/abstracts/search?q=resilient%20cloud%20computing" title=" resilient cloud computing"> resilient cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberattacks" title=" cyberattacks"> cyberattacks</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20risk%20assessment" title=" cybersecurity risk assessment "> cybersecurity risk assessment </a> </p> <a href="https://publications.waset.org/abstracts/129761/towards-resilient-cloud-computing-through-cyber-risk-assessment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129761.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">141</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2771</span> An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nkosingiphile%20Mbusozayo%20Zungu">Nkosingiphile Mbusozayo Zungu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=phishing" title="phishing">phishing</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=informetrics" title=" informetrics"> informetrics</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20security" title=" information security"> information security</a> </p> <a href="https://publications.waset.org/abstracts/150298/an-informetrics-analysis-of-research-on-phishing-in-scopus-and-web-of-science-databases-from-2012-to-2021" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/150298.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">113</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2770</span> Cyber-Softbook: A Platform for Collaborative Content Development and Delivery for Cybersecurity Education</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eniye%20Tebekaemi">Eniye Tebekaemi</a>, <a href="https://publications.waset.org/abstracts/search?q=Martin%20Zhao"> Martin Zhao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The dichotomy between the skills set of newly minted college graduates and the skills required by cybersecurity employers is on the rise. Colleges are struggling to cope with the rapid pace of technology evolution using outdated tools and practices. Industries are getting frustrated due to the need to retrain fresh college graduates on skills they should have acquired. There is a dire need for academic institutions to develop new tools and systems to deliver cybersecurity education to meet the ever-evolving technology demands of the industry. The Cyber-Softbook project’s goal is to bridge the tech industry and tech education gap by providing educators a framework to collaboratively design, manage, and deliver cybersecurity academic courses that meet the needs of the tech industry. The Cyber-Softbook framework, when developed, will provide a platform for academic institutions and tech industries to collaborate on tech education and for students to learn about cybersecurity with all the resources they need to understand concepts and gain valuable skills available on a single platform. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=education" title=" education"> education</a>, <a href="https://publications.waset.org/abstracts/search?q=skills" title=" skills"> skills</a>, <a href="https://publications.waset.org/abstracts/search?q=labs" title=" labs"> labs</a>, <a href="https://publications.waset.org/abstracts/search?q=curriculum" title=" curriculum"> curriculum</a> </p> <a href="https://publications.waset.org/abstracts/146532/cyber-softbook-a-platform-for-collaborative-content-development-and-delivery-for-cybersecurity-education" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146532.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">92</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2769</span> Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Innocent%20Uzougbo%20Onwuegbuzie">Innocent Uzougbo Onwuegbuzie</a>, <a href="https://publications.waset.org/abstracts/search?q=Siene%20Elizabeth%20Eke"> Siene Elizabeth Eke</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20challenges" title="cybersecurity challenges">cybersecurity challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20threat%20mitigation" title=" cyber threat mitigation"> cyber threat mitigation</a>, <a href="https://publications.waset.org/abstracts/search?q=federal%20polytechnic%20Ado-Ekiti" title=" federal polytechnic Ado-Ekiti"> federal polytechnic Ado-Ekiti</a>, <a href="https://publications.waset.org/abstracts/search?q=ICT%20management" title=" ICT management"> ICT management</a> </p> <a href="https://publications.waset.org/abstracts/188248/cybersecurity-challenges-and-solutions-in-ict-management-at-the-federal-polytechnic-ado-ekiti-a-quantitative-study" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188248.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">39</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2768</span> Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gaurav%20Kumar%20Sinha">Gaurav Kumar Sinha</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=industrial%20control%20systems" title=" industrial control systems"> industrial control systems</a>, <a href="https://publications.waset.org/abstracts/search?q=oil%20and%20gas" title=" oil and gas"> oil and gas</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-attacks" title=" cyber-attacks"> cyber-attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT" title=" IoT"> IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20detection" title=" threat detection"> threat detection</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20updates" title=" system updates"> system updates</a>, <a href="https://publications.waset.org/abstracts/search?q=patch%20management" title=" patch management"> patch management</a>, <a href="https://publications.waset.org/abstracts/search?q=access%20control" title=" access control"> access control</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness" title=" cybersecurity awareness"> cybersecurity awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=critical%20infrastructure" title=" critical infrastructure"> critical infrastructure</a>, <a href="https://publications.waset.org/abstracts/search?q=resilience" title=" resilience"> resilience</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20threats" title=" cyber threats"> cyber threats</a>, <a href="https://publications.waset.org/abstracts/search?q=legacy%20systems" title=" legacy systems"> legacy systems</a>, <a href="https://publications.waset.org/abstracts/search?q=IT%20integration" title=" IT integration"> IT integration</a>, <a href="https://publications.waset.org/abstracts/search?q=multi-layered%20defense" title=" multi-layered defense"> multi-layered defense</a>, <a href="https://publications.waset.org/abstracts/search?q=operational%20continuity" title=" operational continuity"> operational continuity</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a>, <a href="https://publications.waset.org/abstracts/search?q=environmental%20integrity" title=" environmental integrity"> environmental integrity</a> </p> <a href="https://publications.waset.org/abstracts/187013/cybersecurity-strategies-for-protecting-oil-and-gas-industrial-control-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/187013.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">43</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2767</span> Combined Safety and Cybersecurity Risk Assessment for Intelligent Distributed Grids</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Anders%20Thors%C3%A9n">Anders Thorsén</a>, <a href="https://publications.waset.org/abstracts/search?q=Behrooz%20Sangchoolie"> Behrooz Sangchoolie</a>, <a href="https://publications.waset.org/abstracts/search?q=Peter%20Folkesson"> Peter Folkesson</a>, <a href="https://publications.waset.org/abstracts/search?q=Ted%20Strandberg"> Ted Strandberg</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As more parts of the power grid become connected to the internet, the risk of cyberattacks increases. To identify the cybersecurity threats and subsequently reduce vulnerabilities, the common practice is to carry out a cybersecurity risk assessment. For safety classified systems and products, there is also a need for safety risk assessments in addition to the cybersecurity risk assessment in order to identify and reduce safety risks. These two risk assessments are usually done separately, but since cybersecurity and functional safety are often related, a more comprehensive method covering both aspects is needed. Some work addressing this has been done for specific domains like the automotive domain, but more general methods suitable for, e.g., intelligent distributed grids, are still missing. One such method from the automotive domain is the Security-Aware Hazard Analysis and Risk Assessment (SAHARA) method that combines safety and cybersecurity risk assessments. This paper presents an approach where the SAHARA method has been modified in order to be more suitable for larger distributed systems. The adapted SAHARA method has a more general risk assessment approach than the original SAHARA. The proposed method has been successfully applied on two use cases of an intelligent distributed grid. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=intelligent%20distribution%20grids" title="intelligent distribution grids">intelligent distribution grids</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20analysis" title=" threat analysis"> threat analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=risk%20assessment" title=" risk assessment"> risk assessment</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a> </p> <a href="https://publications.waset.org/abstracts/143611/combined-safety-and-cybersecurity-risk-assessment-for-intelligent-distributed-grids" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/143611.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2766</span> Navigating Cyber Attacks with Quantum Computing: Leveraging Vulnerabilities and Forensics for Advanced Penetration Testing in Cybersecurity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sayor%20Ajfar%20Aaron">Sayor Ajfar Aaron</a>, <a href="https://publications.waset.org/abstracts/search?q=Ashif%20Newaz"> Ashif Newaz</a>, <a href="https://publications.waset.org/abstracts/search?q=Sajjat%20Hossain%20Abir"> Sajjat Hossain Abir</a>, <a href="https://publications.waset.org/abstracts/search?q=Mushfiqur%20Rahman"> Mushfiqur Rahman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines the transformative potential of quantum computing in the field of cybersecurity, with a focus on advanced penetration testing and forensics. It explores how quantum technologies can be leveraged to identify and exploit vulnerabilities more efficiently than traditional methods and how they can enhance the forensic analysis of cyber-attacks. Through theoretical analysis and practical simulations, this study highlights the enhanced capabilities of quantum algorithms in detecting and responding to sophisticated cyber threats, providing a pathway for developing more resilient cybersecurity infrastructures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber%20forensics" title=" cyber forensics"> cyber forensics</a>, <a href="https://publications.waset.org/abstracts/search?q=penetration%20testing" title=" penetration testing"> penetration testing</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20computing" title=" quantum computing"> quantum computing</a> </p> <a href="https://publications.waset.org/abstracts/185867/navigating-cyber-attacks-with-quantum-computing-leveraging-vulnerabilities-and-forensics-for-advanced-penetration-testing-in-cybersecurity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185867.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2765</span> Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Spanova%20Yerkezhan">Spanova Yerkezhan</a>, <a href="https://publications.waset.org/abstracts/search?q=Amantay%20Ayan"> Amantay Ayan</a>, <a href="https://publications.waset.org/abstracts/search?q=Alimzhanova%20Laura"> Alimzhanova Laura</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=rebranding" title="rebranding">rebranding</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=cyberattack" title=" cyberattack"> cyberattack</a>, <a href="https://publications.waset.org/abstracts/search?q=logo" title=" logo"> logo</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a> </p> <a href="https://publications.waset.org/abstracts/162885/information-technology-in-assessing-risks-and-threats-in-the-transition-of-the-brand-to-the-digital-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/162885.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">166</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2764</span> Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amal%20Hussain%20Alkhaiwani">Amal Hussain Alkhaiwani</a>, <a href="https://publications.waset.org/abstracts/search?q=Ghadah%20Abdullah%20Almalki"> Ghadah Abdullah Almalki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20aspects" title=" human aspects"> human aspects</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20errors" title=" human errors"> human errors</a>, <a href="https://publications.waset.org/abstracts/search?q=human%20mistakes" title=" human mistakes"> human mistakes</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20awareness" title=" security awareness"> security awareness</a>, <a href="https://publications.waset.org/abstracts/search?q=Saudi%20Arabia" title=" Saudi Arabia"> Saudi Arabia</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20program" title=" security program"> security program</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20education" title=" security education"> security education</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20engineering" title=" social engineering"> social engineering</a> </p> <a href="https://publications.waset.org/abstracts/124638/saudi-human-awareness-needs-a-survey-in-how-human-causes-errors-and-mistakes-leads-to-leak-confidential-data-with-proposed-solutions-in-saudi-arabia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/124638.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2763</span> Emerging Threats and Adaptive Defenses: Navigating the Future of Cybersecurity in a Hyperconnected World</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Olasunkanmi%20Jame%20Ayodeji">Olasunkanmi Jame Ayodeji</a>, <a href="https://publications.waset.org/abstracts/search?q=Adebayo%20Adeyinka%20Victor"> Adebayo Adeyinka Victor</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In a hyperconnected world, cybersecurity faces a continuous evolution of threats that challenge traditional defence mechanisms. This paper explores emerging cybersecurity threats like malware, ransomware, phishing, social engineering, and the Internet of Things (IoT) vulnerabilities. It delves into the inadequacies of existing cybersecurity defences in addressing these evolving risks and advocates for adaptive defence mechanisms that leverage AI, machine learning, and zero-trust architectures. The paper proposes collaborative approaches, including public-private partnerships and information sharing, as essential to building a robust defence strategy to address future cyber threats. The need for continuous monitoring, real-time incident response, and adaptive resilience strategies is highlighted to fortify digital infrastructures in the face of escalating global cyber risks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=hyperconnectivity" title=" hyperconnectivity"> hyperconnectivity</a>, <a href="https://publications.waset.org/abstracts/search?q=malware" title=" malware"> malware</a>, <a href="https://publications.waset.org/abstracts/search?q=adaptive%20defences" title=" adaptive defences"> adaptive defences</a>, <a href="https://publications.waset.org/abstracts/search?q=zero-trust%20architecture" title=" zero-trust architecture"> zero-trust architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things%20vulnerabilities" title=" internet of things vulnerabilities"> internet of things vulnerabilities</a> </p> <a href="https://publications.waset.org/abstracts/192296/emerging-threats-and-adaptive-defenses-navigating-the-future-of-cybersecurity-in-a-hyperconnected-world" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/192296.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">20</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2762</span> Net-Trainer-ST: A Swiss Army Knife for Pentesting, Based on Single Board Computer, for Cybersecurity Professionals and Hobbyists</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20Ho%C5%82da">K. Hołda</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20%C5%9Aliwa"> D. Śliwa</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Daniec"> K. Daniec</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Nawrat"> A. Nawrat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This article was created as part of the developed master's thesis. It attempts to present a newly developed device, which will support the work of specialists dealing with broadly understood cybersecurity terms. The device is contrived to automate security tests. In addition, it simulates potential cyberattacks in the most realistic way possible, without causing permanent damage to the network, in order to maximize the quality of the subsequent corrections to the tested network systems. The proposed solution is a fully operational prototype created from commonly available electronic components and a single board computer. The focus of the following article is not only put on the hardware part of the device but also on the theoretical and applicatory way in which implemented cybersecurity tests operate and examples of their results. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Raspberry%20Pi" title="Raspberry Pi">Raspberry Pi</a>, <a href="https://publications.waset.org/abstracts/search?q=ethernet" title=" ethernet"> ethernet</a>, <a href="https://publications.waset.org/abstracts/search?q=automated%20cybersecurity%20tests" title=" automated cybersecurity tests"> automated cybersecurity tests</a>, <a href="https://publications.waset.org/abstracts/search?q=ARP" title=" ARP"> ARP</a>, <a href="https://publications.waset.org/abstracts/search?q=DNS" title=" DNS"> DNS</a>, <a href="https://publications.waset.org/abstracts/search?q=backdoor" title=" backdoor"> backdoor</a>, <a href="https://publications.waset.org/abstracts/search?q=TCP" title=" TCP"> TCP</a>, <a href="https://publications.waset.org/abstracts/search?q=password%20sniffing" title=" password sniffing"> password sniffing</a> </p> <a href="https://publications.waset.org/abstracts/148004/net-trainer-st-a-swiss-army-knife-for-pentesting-based-on-single-board-computer-for-cybersecurity-professionals-and-hobbyists" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148004.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">125</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2761</span> Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Logan%20Carmichael">Logan Carmichael</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title="cybersecurity">cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20governance" title=" digital governance"> digital governance</a>, <a href="https://publications.waset.org/abstracts/search?q=Estonia" title=" Estonia"> Estonia</a>, <a href="https://publications.waset.org/abstracts/search?q=crisis%20management" title=" crisis management"> crisis management</a>, <a href="https://publications.waset.org/abstracts/search?q=governance%20in%20crisis" title=" governance in crisis"> governance in crisis</a> </p> <a href="https://publications.waset.org/abstracts/148358/digital-governance-decision-making-in-the-aftermath-of-cybersecurity-crises-lessons-from-estonia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148358.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">112</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2760</span> Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asmaa%20El%20Harat">Asmaa El Harat</a>, <a href="https://publications.waset.org/abstracts/search?q=Toumi%20Hicham"> Toumi Hicham</a>, <a href="https://publications.waset.org/abstracts/search?q=Youssef%20Baddi"> Youssef Baddi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things%20%28IoT%29" title="internet of things (IoT)">internet of things (IoT)</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity" title=" cybersecurity"> cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a> </p> <a href="https://publications.waset.org/abstracts/188872/cyber-attacks-management-in-iot-networks-using-deep-learning-and-edge-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/188872.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">31</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2759</span> Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20Mutemwa">M. Mutemwa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component; therefore, there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, web servers, etc. for security posture monitoring. That is which systems need to be monitored first and the order by which the rest of the systems follow. Secondly, the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and non-technical employees of an organization. Also the priority matrix for incident types and notifications of incidents. Thirdly, the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly, the paper looks at how to show value for the large investments that are poured into designing, building and running a SOC. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20operation%20centre" title="cybersecurity operation centre">cybersecurity operation centre</a>, <a href="https://publications.waset.org/abstracts/search?q=incident%20response" title=" incident response"> incident response</a>, <a href="https://publications.waset.org/abstracts/search?q=priority%20matrix" title=" priority matrix"> priority matrix</a>, <a href="https://publications.waset.org/abstracts/search?q=procedures%20and%20policies" title=" procedures and policies"> procedures and policies</a> </p> <a href="https://publications.waset.org/abstracts/99513/integrating-a-security-operations-centre-with-an-organizations-existing-procedures-policies-and-information-technology-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99513.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">153</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">2758</span> Cybersecurity Challenges in the Era of Open Banking</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Krish%20Batra">Krish Batra</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=open%20banking" title="open banking">open banking</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20services%20industry" title=" financial services industry"> financial services industry</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20challenges" title=" cybersecurity challenges"> cybersecurity challenges</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20breaches" title=" data breaches"> data breaches</a>, <a href="https://publications.waset.org/abstracts/search?q=phishing%20attacks" title=" phishing attacks"> phishing attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=encryption" title=" encryption"> encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=API%20security%20protocols" title=" API security protocols"> API security protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication%20mechanisms" title=" authentication mechanisms"> authentication mechanisms</a>, <a href="https://publications.waset.org/abstracts/search?q=regulatory%20response" title=" regulatory response"> regulatory response</a>, <a href="https://publications.waset.org/abstracts/search?q=PSD2" title=" PSD2"> PSD2</a>, <a href="https://publications.waset.org/abstracts/search?q=cybersecurity%20practices" title=" cybersecurity practices"> cybersecurity practices</a> </p> <a href="https://publications.waset.org/abstracts/184392/cybersecurity-challenges-in-the-era-of-open-banking" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/184392.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">60</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=92">92</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=93">93</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=cybersecurity%20awareness&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10