Search results for: student population cybersecurity awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9972

Search results for: student population cybersecurity awareness

9942 Cyber-Softbook: A Platform for Collaborative Content Development and Delivery for Cybersecurity Education

Authors: Eniye Tebekaemi, Martin Zhao

Abstract:

The dichotomy between the skills set of newly minted college graduates and the skills required by cybersecurity employers is on the rise. Colleges are struggling to cope with the rapid pace of technology evolution using outdated tools and practices. Industries are getting frustrated due to the need to retrain fresh college graduates on skills they should have acquired. There is a dire need for academic institutions to develop new tools and systems to deliver cybersecurity education to meet the ever-evolving technology demands of the industry. The Cyber-Softbook project’s goal is to bridge the tech industry and tech education gap by providing educators a framework to collaboratively design, manage, and deliver cybersecurity academic courses that meet the needs of the tech industry. The Cyber-Softbook framework, when developed, will provide a platform for academic institutions and tech industries to collaborate on tech education and for students to learn about cybersecurity with all the resources they need to understand concepts and gain valuable skills available on a single platform.

Keywords: cybersecurity, education, skills, labs, curriculum

Procedia PDF Downloads 57
9941 Understanding Student Pilot Mental Workload in Recreational Aircraft Training

Authors: Ron Bishop, Jim Mitchell, Talitha Best

Abstract:

The increase in air travel worldwide has resulted in a pilot shortage. To increase student pilot capacity and lower costs, flight schools have increased the use of recreational aircraft (RA) with technological advanced cockpits in flight schools. The impact of RA based training compared to general aviation (GA) aircraft training on student mental workload is not well understood. This research investigated student pilot (N = 17) awareness of mental workload between technologically advanced cockpit equipped RA training with analogue gauge equipped GA training. The results showed a significantly higher rating of mental workload across subscales of mental and physical demand on the NASA-TLX in recreational aviation aircraft training compared to GA aircraft. Similarly, thematic content analysis of follow-up questions identified that mental workload of the student pilots flying the RA was perceived to be more than the GA aircraft.

Keywords: mental workload, recreational aircraft, student pilot, training

Procedia PDF Downloads 126
9940 Combined Safety and Cybersecurity Risk Assessment for Intelligent Distributed Grids

Authors: Anders Thorsén, Behrooz Sangchoolie, Peter Folkesson, Ted Strandberg

Abstract:

As more parts of the power grid become connected to the internet, the risk of cyberattacks increases. To identify the cybersecurity threats and subsequently reduce vulnerabilities, the common practice is to carry out a cybersecurity risk assessment. For safety classified systems and products, there is also a need for safety risk assessments in addition to the cybersecurity risk assessment in order to identify and reduce safety risks. These two risk assessments are usually done separately, but since cybersecurity and functional safety are often related, a more comprehensive method covering both aspects is needed. Some work addressing this has been done for specific domains like the automotive domain, but more general methods suitable for, e.g., intelligent distributed grids, are still missing. One such method from the automotive domain is the Security-Aware Hazard Analysis and Risk Assessment (SAHARA) method that combines safety and cybersecurity risk assessments. This paper presents an approach where the SAHARA method has been modified in order to be more suitable for larger distributed systems. The adapted SAHARA method has a more general risk assessment approach than the original SAHARA. The proposed method has been successfully applied on two use cases of an intelligent distributed grid.

Keywords: intelligent distribution grids, threat analysis, risk assessment, safety, cybersecurity

Procedia PDF Downloads 122
9939 Review of Student-Staff Agreements in Higher Education: Creating a Framework

Authors: Luke Power, Paul O'Leary

Abstract:

Research has long described the enhancement of student engagement as a fundamental aim of delivering a consistent, lifelong benefit to student success across the multitude of dimensions a quality HE (higher education) experience offers. Engagement may take many forms, with Universities and Institutes across the world attempting to define the parameters which constitutes a successful student engagement framework and implementation strategy. These efforts broadly include empowering students, encouraging involvement, and the transfer of decision-making power through a variety of methods with the goal of obtaining a meaningful partnership between students and staff. As the Republic of Ireland continues to observe an increasing population transferring directly from secondary education to HE institutions, it falls on these institutions to research and develop effective strategies which insures the growing student population have every opportunity to engage with their education, research community, and staff. This research systematically reviews SPAs (student partnership agreements) which are currently in the process of being defined, and/or have been adopted at HE institutions, worldwide. Despite the demonstrated importance of a student-staff partnership to the overall student engagement experience, there is no obvious framework or model by which to begin this process. This work will therefore provide a novel analysis of student-staff agreements which will focus on examining the factors of success common to each and builds towards a workable and applicable framework using critical review, analysis of the key words, phraseology, student involvement, and the broadly applicable HE traits and values. Following the analysis, this work proposes SPA ‘toolkit’ with input from key stakeholders such as students, staff, faculty, and alumni. The resulting implications for future research and the lessons learned from the development and implementation of the SPA will aid the systematic implementation of student-staff agreements in Ireland and beyond.

Keywords: student engagement, student partnership agreements, student-staff partnerships, higher education, systematic review, democratising students, empowering students, student unions

Procedia PDF Downloads 147
9938 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 125
9937 Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment

Authors: Spanova Yerkezhan, Amantay Ayan, Alimzhanova Laura

Abstract:

This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding.

Keywords: rebranding, cybersecurity, cyberattack, logo, vulnerability

Procedia PDF Downloads 128
9936 An Investigation of Environmental Education Knowledge for Sustainable Development in High School Sectors in UK

Authors: Abolaji Mayowa Akinyele

Abstract:

The purpose of this study was to investigate student’s awareness, Knowledge and understanding of environmental issues for sustainable development. Findings revealed that; despite the positive attitude shown by students towards environmental education, a relatively low level of understanding of environmental concept was recorded in school settings regardless of efforts by government and other environmental agencies at creating awareness about environmental related issues. This brought about the investigation of students environmental education knowledge in high school settings. About 205 Students were randomly selected for data collection using validated instruments titled student’s knowledge and attitude questionnaire as well as student’s response to questions (interview) concerning global warming. T-test statistics, chi-square and simple percentage were the major statistical tools employed in data analysis. This study revealed that environment based-education (school curriculum) as well as efforts by government/environmental agencies (mass media) plays a major role in promoting students understanding, of environmental concepts, awareness of major environmental issues and positive attitude towards natural environment.

Keywords: environmental issues, sustainable development, students attitude, students knowledge

Procedia PDF Downloads 425
9935 Improving University Operations with Data Mining: Predicting Student Performance

Authors: Mladen Dragičević, Mirjana Pejić Bach, Vanja Šimičević

Abstract:

The purpose of this paper is to develop models that would enable predicting student success. These models could improve allocation of students among colleges and optimize the newly introduced model of government subsidies for higher education. For the purpose of collecting data, an anonymous survey was carried out in the last year of undergraduate degree student population using random sampling method. Decision trees were created of which two have been chosen that were most successful in predicting student success based on two criteria: Grade Point Average (GPA) and time that a student needs to finish the undergraduate program (time-to-degree). Decision trees have been shown as a good method of classification student success and they could be even more improved by increasing survey sample and developing specialized decision trees for each type of college. These types of methods have a big potential for use in decision support systems.

Keywords: data mining, knowledge discovery in databases, prediction models, student success

Procedia PDF Downloads 382
9934 Pattern Discovery from Student Feedback: Identifying Factors to Improve Student Emotions in Learning

Authors: Angelina A. Tzacheva, Jaishree Ranganathan

Abstract:

Interest in (STEM) Science Technology Engineering Mathematics education especially Computer Science education has seen a drastic increase across the country. This fuels effort towards recruiting and admitting a diverse population of students. Thus the changing conditions in terms of the student population, diversity and the expected teaching and learning outcomes give the platform for use of Innovative Teaching models and technologies. It is necessary that these methods adapted should also concentrate on raising quality of such innovations and have positive impact on student learning. Light-Weight Team is an Active Learning Pedagogy, which is considered to be low-stake activity and has very little or no direct impact on student grades. Emotion plays a major role in student’s motivation to learning. In this work we use the student feedback data with emotion classification using surveys at a public research institution in the United States. We use Actionable Pattern Discovery method for this purpose. Actionable patterns are patterns that provide suggestions in the form of rules to help the user achieve better outcomes. The proposed method provides meaningful insight in terms of changes that can be incorporated in the Light-Weight team activities, resources utilized in the course. The results suggest how to enhance student emotions to a more positive state, in particular focuses on the emotions ‘Trust’ and ‘Joy’.

Keywords: actionable pattern discovery, education, emotion, data mining

Procedia PDF Downloads 63
9933 The Functions of the Student Voice and Student-Centred Teaching Practices in Classroom-Based Music Education

Authors: Sofia Douklia

Abstract:

The present context paper aims to present the important role of ‘student voice’ and the music teacher in the classroom, which contributes to more student-centered music education. The aim is to focus on the functions of the student voice through the music spectrum, which has been born in the music classroom, and the teacher’s methodologies and techniques used in the music classroom. The music curriculum, the principles of student-centered music education, and the role of students and teachers as music ambassadors have been considered the major music parameters of student voice. The student- voice is a worth-mentioning aspect of a student-centered education, and all teachers should consider and promote its existence in their classroom.

Keywords: student's voice, student-centered education, music ambassadors, music teachers

Procedia PDF Downloads 62
9932 An Assessment of the Usage of Learner Centred Methods among Student Teachers of Federal College of Education Kontagora

Authors: Sadiq Habiba Alhaji

Abstract:

This is a descriptive survey design intended to determine the level of usage of the learner centred methods by student teachers of Federal College of Education Kontagora, Niger State, Nigeria. The study was guided by two null hypotheses formulated by the researcher. The population of the study are students of Federal College of Education, Kontagora. The Target Population consisted of one hundred Teaching practice students drawn from sciences, Arts, and humanities who were posted to various schools practicing different teaching methods. The student teachers were supervised using the checklist designed by the researcher to determine their level of usage of learner centred methods. Data collected was analysed using t test of independent variables. It was recommended that pre service and in service teachers should be equipped with the skills of using learner centred methods.

Keywords: assessment, usage, learner centred, methods, student teachers

Procedia PDF Downloads 57
9931 Cultivating Individuality and Equality in Education: A Literature Review on Respecting Dimensions of Diversity within the Classroom

Authors: Melissa C. Ingram

Abstract:

This literature review sought to explore the dimensions of diversity that can affect classroom learning. This review is significant as it can aid educators in reaching more of their diverse student population and creating supportive classrooms for teachers and students. For this study, peer-reviewed articles were found and compiled using Google Scholar. Key terms used in the search include student individuality, classroom equality, student development, teacher development, and teacher individuality. Relevant educational standards such as Common Core and Partnership for the 21st Century were also included as part of this review. Student and teacher individuality and equality is discussed as well as methods to grow both within educational settings. Embracing student and teacher individuality was found to be key as it may affect how each person interacts with given information. One method to grow individuality and equality in educational settings included drafting and employing revised teaching standards which include various Common Core and U.S. State standards. Another was to use educational theories such as constructivism, cognitive learning, and Experiential Learning Theory. However, barriers to growing individuality, such as not acknowledging differences in a population’s dimensions of diversity, still exist. Studies found preserving the dimensions of diversity owned by both teachers and students yielded more positive and beneficial classroom experiences.

Keywords: classroom equality, student development, student individuality, teacher development, teacher individuality

Procedia PDF Downloads 147
9930 The Factors Affecting the Development of the Media and Animations for Vocational School in Thailand

Authors: Tanit Pruktara

Abstract:

The research aimed to study the students’ learning achievement and awareness level on electrical energy consumption and conservation and also to investigate the students’ attitude on the developed multimedia supplemented instructional unit for learning household electrical energy consumption and conservation in grade 10 Thailand student. This study used a quantitative method using MCQ for pre and post-achievement tests and Likert scales for awareness and attitude survey questionnaires. The results from this were employed to improve the multimedia to be appropriate for the classroom and with real life situations in the second phase, the main study. The experimental results showed that the developed learning unit significantly improved the students’ learning achievement as well as their awareness of electric energy conservation. Additional we found the student will enjoy participating in class activities when the lessons are taught using multimedia and helps them to develop the relevance between the course and real world situations.

Keywords: lesson plan, media and animations, training course, vocational school in Thailand

Procedia PDF Downloads 149
9929 Student and Group Activity Level Assessment in the ELARS Recommender System

Authors: Martina Holenko Dlab, Natasa Hoic-Bozic

Abstract:

This paper presents an original approach to student and group activity level assessment that relies on certainty factors theory. Activity level is used to represent quantity and continuity of student’s contributions in individual and collaborative e‑learning activities (e‑tivities) and is calculated to assist teachers in assessing quantitative aspects of student's achievements. Calculated activity levels are also used to raise awareness and provide recommendations during the learning process. The proposed approach was implemented within the educational recommender system ELARS and validated using data obtained from e‑tivity realized during a blended learning course. The results showed that the proposed approach can be used to estimate activity level in the context of e-tivities realized using Web 2.0 tools as well as to facilitate the assessment of quantitative aspect of students’ participation in e‑tivities.

Keywords: assessment, ELARS, e-learning, recommender systems, student model

Procedia PDF Downloads 233
9928 Net-Trainer-ST: A Swiss Army Knife for Pentesting, Based on Single Board Computer, for Cybersecurity Professionals and Hobbyists

Authors: K. Hołda, D. Śliwa, K. Daniec, A. Nawrat

Abstract:

This article was created as part of the developed master's thesis. It attempts to present a newly developed device, which will support the work of specialists dealing with broadly understood cybersecurity terms. The device is contrived to automate security tests. In addition, it simulates potential cyberattacks in the most realistic way possible, without causing permanent damage to the network, in order to maximize the quality of the subsequent corrections to the tested network systems. The proposed solution is a fully operational prototype created from commonly available electronic components and a single board computer. The focus of the following article is not only put on the hardware part of the device but also on the theoretical and applicatory way in which implemented cybersecurity tests operate and examples of their results.

Keywords: Raspberry Pi, ethernet, automated cybersecurity tests, ARP, DNS, backdoor, TCP, password sniffing

Procedia PDF Downloads 93
9927 Knowledge, Awareness and Practices Concerning of Breast Cancer among Nursing Students in Sri Lanka

Authors: Vimarshi Sandamali Godigamuwa

Abstract:

Background: Breast cancer is the leading cause of cancer mortality in women worldwide. Its incidence is increasing and young women affected more than ever. Nursing students are the future nurses who will have the opportunity to encourage and influence women to be aware of breast cancers. Objectives: To determine the level of knowledge, awareness and practices concerning of breast cancer among Sri Lankan student nurses. Methods: A descriptive cross sectional study was conducted on 150 nursing students who are in their 2nd and 3rd year studies by distributing a standard self-administered questionnaire. The completed questionnaire were retrieved, graded and scored. Results: Mean age of the respondents was 24.27; (SD=1.66) years and ranged from 20-30 years. Most of the students were female which was 85%. 32% of nursing students scored below 55% for the questionnaire and only 7.3% had good overall knowledge and awareness of breast cancer. Out of 128 female students 89.9% were answered that they know how to perform Breast Self Examination (BSE), out of which 37% of them performed BSE regularly. Only 33% were aware of recommended age for BSE and 10% were knew the recommended age for mammography. 9.3% were aware of frequency for Clinical Breast Examination on 20-39 years of age group. Of the female participants, 11.7% reported positive family history of breast cancer. Conclusion: Nursing students should explore to health educational programs on regular basis on breast cancer and its screening methods. Further studies are needed to identify reasons for not practicing BSE.

Keywords: breast cancer, student nurses, knowledge, awareness, practice, BSE

Procedia PDF Downloads 421
9926 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia

Authors: Logan Carmichael

Abstract:

As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.

Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis

Procedia PDF Downloads 85
9925 Using Problem-Based Learning on Teaching Early Intervention for College Students

Authors: Chen-Ya Juan

Abstract:

In recent years, the increasing number of children with special needs has brought a lot of attention by many scholars and experts in education, which enforced the preschool teachers face the harsh challenge in the classroom. To protect the right of equal education for all children, enhance the quality of children learning, and take care of the needs of children with special needs, the special education paraprofessional becomes one of the future employment trends for students of the department of the early childhood care and education. Problem-based learning is a problem-oriented instruction, which is different from traditional instruction. The instructor first designed an ambiguous problem direction, following the basic knowledge of early intervention, students had to find clues to solve the problem defined by themselves. In the class, the total instruction included 20 hours, two hours per week. The primary purpose of this paper is to investigate the relationship of student academic scores, self-awareness, learning motivation, learning attitudes, and early intervention knowledge. A total of 105 college students participated in this study and 97 questionnaires were effective. The effective response rate was 90%. The student participants included 95 females and two males. The average age of the participants was 19 years old. The questionnaires included 125 questions divided into four major dimensions: (1) Self-awareness, (2) learning motivation, (3) learning attitudes, and (4) early intervention knowledge. The results indicated (1) the scores of self-awareness were 58%; the scores of the learning motivations was 64.9%; the scores of the learning attitudes was 55.3%. (2) After the instruction, the early intervention knowledge has been increased to 64.2% from 38.4%. (3) Student’s academic performance has positive relationship with self-awareness (p < 0.05; R = 0.506), learning motivation (p < 0.05; R = 0.487), learning attitudes (p < 0.05; R = 0.527). The results implied that although students had gained early intervention knowledge by using PBL instruction, students had medium scores on self-awareness and learning attitudes, medium high in learning motivations.

Keywords: college students, children with special needs, problem-based learning, learning motivation

Procedia PDF Downloads 122
9924 The Relationships between How and Why Students Learn and Academic Achievement

Authors: S. Chee Choy, Daljeet Singh Sedhu

Abstract:

This study examines the relationships between how and why students learned and academic achievement for 2646 university students from various faculties. The LALQ, a self-report measure of student approaches to learning was administered and academic achievement data were obtained from student CGPA. The results showed significant differences in the approach to learning of male and female students. How and why students learned can influence their achievement and efficacy as well. High and low achievers have different learning behaviours. High female achievers were more likely to learn for a better future and be persistent in it. Meanwhile high male achievers were more likely to seek approval from their peers and be more confident about graduating on time from their university. The implications of individual differences and limitations of the study are discussed.

Keywords: student learning, learner awareness, student achievement, LALQ

Procedia PDF Downloads 319
9923 Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems

Authors: M. Mutemwa

Abstract:

A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component; therefore, there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, web servers, etc. for security posture monitoring. That is which systems need to be monitored first and the order by which the rest of the systems follow. Secondly, the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and non-technical employees of an organization. Also the priority matrix for incident types and notifications of incidents. Thirdly, the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly, the paper looks at how to show value for the large investments that are poured into designing, building and running a SOC.

Keywords: cybersecurity operation centre, incident response, priority matrix, procedures and policies

Procedia PDF Downloads 121
9922 Cybersecurity Challenges in the Era of Open Banking

Authors: Krish Batra

Abstract:

The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.

Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices

Procedia PDF Downloads 21
9921 Strategic Cyber Sentinel: A Paradigm Shift in Enhancing Cybersecurity Resilience

Authors: Ayomide Oyedele

Abstract:

In the dynamic landscape of cybersecurity, "Strategic Cyber Sentinel" emerges as a revolutionary framework, transcending traditional approaches. This paper pioneers a holistic strategy, weaving together threat intelligence, machine learning, and adaptive defenses. Through meticulous real-world simulations, we demonstrate the unprecedented resilience of our framework against evolving cyber threats. "Strategic Cyber Sentinel" redefines proactive threat mitigation, offering a robust defense architecture poised for the challenges of tomorrow.

Keywords: cybersecurity, resilience, threat intelligence, machine learning, adaptive defenses

Procedia PDF Downloads 36
9920 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 135
9919 To Assess the Awareness and Health Seeking Practices Related to Vitamin-A Deficiency Diseases in Urban Slums of Delhi, India

Authors: Dr.Vasundhra Misra, Prof. Praveen Vashist

Abstract:

Purpose: Vitamin A deficiency prevention programmes are at varying stages of development and implementation in all countries. Vitamin A deficiency has been recognized as a public health issue in developing countries like India. Despite achieving a lot of success a load of blindness due to Vitamin A deficiencies is still high. In this regard, a study was conducted to assess the awareness and health-seeking practices about Vitamin A deficiency diseases among the urban slum population of Delhi, India. Methods: A descriptive cross-sectional study was conducted in the 5 slum clusters from the urban population of South Delhi. A specially designed pre-tested questionnaire schedule was administered. The study sample was comprised of 1552 inhabitants. Results: The mean age of the respondents was 34 ± 12.1 years. A total of 1003 (64.6%) participants out of 1552, had heard of night blindness. Awareness of night blindness was more in the elderly age group and also found significant (p < 0.001). Only 31 (3.1%) knew that night blindness is caused due to deficiency of vitamin A. The awareness of vitamin A prophylaxis programme was significantly higher among elder age (p < 0.05) and females (p < 0.05). Conclusion: The findings highlighted that even though many of the respondents have heard of night blindness but the awareness about causes and treatment was found low in the community. There is a need for efforts directed to enhance community-level counseling and educational programmes.

Keywords: awareness, health-seeking practices, night blindness, vitamin-A deficiency diseases

Procedia PDF Downloads 126
9918 Effectiveness of Using Phonemic Awareness Based Activities in Improving Decoding Skills of Third Grade Students Referred for Reading Disabilities in Oman

Authors: Mahmoud Mohamed Emam

Abstract:

In Oman the number of students referred for reading disabilities is on the rise. Schools serve these students by placement in the so-called learning disabilities unit. Recently the author led a strategic project to train teachers on the use of curriculum based measurement to identify students with reading disabilities in Oman. Additional the project involved training teachers to use phonemic awareness based activities to improve reading skills of those students. Phonemic awareness refers to the ability to notice, think about, and work with the individual sounds in words. We know that a student's skill in phonemic awareness is a good predictor of later reading success or difficulty. Using multiple baseline design across four participants the current studies investigated the effectiveness of using phonemic awareness based activities to improve decoding skills of third grade students referred for reading disabilities in Oman. During treatment students received phonemic awareness based activities that were designed to fulfill the idiosyncratic characteristics of Arabic language phonology as well as orthography. Results indicated that the phonemic awareness based activities were effective in substantially increasing the number of correctly decoded word for all four participants. Maintenance of strategy effects was evident for the weeks following the termination of intervention for the four students. In addition, the effects of intervention generalized to decoding novel words for all four participants.

Keywords: learning disabilities, phonemic awareness, third graders, Oman

Procedia PDF Downloads 613
9917 Screen Casting Instead of Illegible Scribbles: Making a Mini Movie for Feedback on Students’ Scholarly Papers

Authors: Kerri Alderson

Abstract:

There is pervasive awareness by post secondary faculty that written feedback on course assignments is inconsistently reviewed by students. In order to support student success and growth, a novel method of providing feedback was sought, and screen casting - short, narrated “movies” of audio visual instructor feedback on students’ scholarly papers - was provided as an alternative to traditional means. An overview of the teaching and learning experience as well as the user-friendly software utilized will be presented. This study covers an overview of this more direct, student-centered medium for providing feedback using technology familiar to post secondary students. Reminiscent of direct personal contact, the personalized video feedback is positively evaluated by students as a formative medium for student growth in scholarly writing.

Keywords: education, pedagogy, screen casting, student feedback, teaching and learning

Procedia PDF Downloads 94
9916 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 60
9915 Cybersecurity for Digital Twins in the Built Environment: Research Landscape, Industry Attitudes and Future Direction

Authors: Kaznah Alshammari, Thomas Beach, Yacine Rezgui

Abstract:

Technological advances in the construction sector are helping to make smart cities a reality by means of cyber-physical systems (CPS). CPS integrate information and the physical world through the use of information communication technologies (ICT). An increasingly common goal in the built environment is to integrate building information models (BIM) with the Internet of Things (IoT) and sensor technologies using CPS. Future advances could see the adoption of digital twins, creating new opportunities for CPS using monitoring, simulation, and optimisation technologies. However, researchers often fail to fully consider the security implications. To date, it is not widely possible to assimilate BIM data and cybersecurity concepts, and, therefore, security has thus far been overlooked. This paper reviews the empirical literature concerning IoT applications in the built environment and discusses real-world applications of the IoT intended to enhance construction practices, people’s lives and bolster cybersecurity. Specifically, this research addresses two research questions: (a) how suitable are the current IoT and CPS security stacks to address the cybersecurity threats facing digital twins in the context of smart buildings and districts? and (b) what are the current obstacles to tackling cybersecurity threats to the built environment CPS? To answer these questions, this paper reviews the current state-of-the-art research concerning digital twins in the built environment, the IoT, BIM, urban cities, and cybersecurity. The results of these findings of this study confirmed the importance of using digital twins in both IoT and BIM. Also, eight reference zones across Europe have gained special recognition for their contributions to the advancement of IoT science. Therefore, this paper evaluates the use of digital twins in CPS to arrive at recommendations for expanding BIM specifications to facilitate IoT compliance, bolster cybersecurity and integrate digital twin and city standards in the smart cities of the future.

Keywords: BIM, cybersecurity, digital twins, IoT, urban cities

Procedia PDF Downloads 138
9914 A Preliminary Comparative Study Between the United Kingdom and Taiwan: Public Private Collaboration and Cooperation in Tackling Large Scale Cyberattacks

Authors: Chi-Hsuan Cheng

Abstract:

This research aims to evaluate public-private partnerships against cyberattacks by comparing the UK and Taiwan. First, the study analyses major cyberattacks and factors influencing cybersecurity in both countries. Second, it assesses the effectiveness of current cyber defence strategies in combating cyberattacks by comparing the approaches taken in the UK and Taiwan, while also evaluating the cyber resilience of both nations. Lastly, the research evaluates existing public-private partnerships by comparing those in the UK and Taiwan, and proposes recommendations for enhancing cooperation and collaboration mechanisms in tackling cyberattacks. Grounded theory serves as the core research method. Theoretical sampling is used to recruit participants in both the UK and Taiwan, including investigators, police officers, and professionals from cybersecurity firms. Semi-structured interviews are conducted in English in the UK and Mandarin in Taiwan, recorded with consent, and pseudonymised for privacy. Data analysis involves open coding, grouping excerpts into codes, and categorising codes. Axial coding connects codes into categories, leading to the development of a codebook. The process continues iteratively until theoretical saturation is reached. Finally, selective coding identifies the core topic, evaluating public-private cooperation against cyberattacks and its implications for social and policing strategies in the UK and Taiwan, which highlights the current status of the cybersecurity industry, governmental plans for cybersecurity, and contributions to cybersecurity from both government sectors and cybersecurity firms, with a particular focus on public-private partnerships. In summary, this research aims to offer practical recommendations to law enforcement, private sectors, and academia for reflecting on current strategies and tailoring future approaches in cybersecurity

Keywords: cybersecurity, cybercrime, public private partnerships, cyberattack

Procedia PDF Downloads 25
9913 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 169