skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: An Introductory Visualization Aid for Cybersecurity Education
As technology keeps overgrowing, Internet surfing becomes more popular. As a consequence, users tend to use it for social media, shopping, banking, or any other online services in which they need to put their personal information. These online activities attract malicious computer users to apply cyberattack techniques to steal other user's data. The users become attack victims due to limited understanding of cyberattacks and safety practices. In this paper, we propose a framework development for interactive and engaging cybersecurity education. With the help of the framework, the users will be able to learn different types of cyberattacks and defenses along with the safe cybersecurity practices. We also discuss the current state of the framework and conclude the paper with a discussion on limitations and future work.  more » « less
Award ID(s):
1903419
PAR ID:
10160585
Author(s) / Creator(s):
; ; ; ; ;
Date Published:
Journal Name:
15th International Conference on Frontiers in Education: Computer Science and Computer Engineering, (FECS 19)
Page Range / eLocation ID:
10-15
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. The enormous advancement of digital technology and the Internet usage have significantly improved our lives, but have threatened our security and privacy as well. Cyberattacks may have harmful long-term implications to individuals and organizations. High school students are accessible targets for various cybercrimes due to the lack of cybersecurity knowledge and cyber-safe practices. It is important that education about cybersecurity awareness and cyber hygiene practices must begin at a young age. Offering cybersecurity knowledge through interactive tutorials and game-based techniques may increase students' interest in this domain. To develop a security mindset and improve the perception and attitude towards cybersecurity, we created an interactive cybersecurity framework for high school students. Through this framework, we attempt to effectively educate students in cybersecurity through interactive animated visualization modules developed in Unity 3D engine, enabling learning of physical, software, and mathematical aspects of cybersecurity. Each topic in the visualization tool is explained in four stages including information, interaction, explanation, and assessment. Several surveys have been conducted to determine whether this framework enhances users' cognitive abilities. 
    more » « less
  2. Cybersecurity is a complex problem. To study the complexity underneath the system and forecast possible future cyber events, we used system dynamics (SD)modeling and simulation.Network operations are normally modeled and simulated using the discrete-event simulation (DES) techniques. Since the primary focus of the DES modeling is packet traffic, the cyberattacks and resulting defenses are viewed from the layer 3 (network layer) of the open system interconnection (OSI) model. This does not discover more harmful attacks that might occur at higher(layer 4 and above) OSI layers. There are 32 million small businesses across the United States and 81 percent of them do not have cybersecurity personnel. Today’s extraordinary (COVID-19) situation, application layer (layer 7) security is the key concern for everyone, because every business revenue is heavily dependent on online/always-on presence. Research shows that almost 70 percent of successful cyber attacks are happening at the application layer. This paper presents a new integrated SD modeling framework for the application layer security to help small businesses from cyberattacks. 
    more » « less
  3. With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of technology leaders in K-12 settings. Data collected from 23 district websites and from interviews with 12 district technology leaders were analyzed. Top security practices included cloud-based technologies, segregated network/V-LAN, two-factor authentication, limiting access, and use of Clever or Class Link. Top challenges included keeping users informed, lack of buy-in from staff and decision-makers, lack of expertise to implement modern best practices, and cost of resources. Top concerns included possible cyberattacks, leaked student data, and lack of user awareness. Finally, their wish list included technology personnel, access to Clever of Class Link, external system diagnostic checks, professional development for staff, and replacing aging infrastructure. The findings have implications for K-12 administrators, technology leaders, and teachers. 
    more » « less
  4. Vehicle cybersecurity is a serious concern, as modern vehicles are vulnerable to cyberattacks. How drivers respond to situations induced by vehicle cyberattacks is safety critical. This paper sought to understand the effect of human drivers’ risky driving style on response behavior to unexpected vehicle cyberattacks. A driving simulator study was conducted wherein 32 participants experienced a series of simulated drives in which unexpected events caused by vehicle cyberattacks were presented. Participants’ response behavior was assessed by their change in velocity after the cybersecurity events occurred, their post-event acceleration, as well as time to first reaction. Risky driving style was portrayed by scores on the Driver Behavior Questionnaire (DBQ) and the Brief Sensation Seeking Scale (BSSS). Half of the participants also received training regarding vehicle cybersecurity before the experiment. Results suggest that when encountering certain cyberattack-induced unexpected events, whether one received training, driving scenario, participants’ gender, DBQ-Violation scores, together with their sensation seeking measured by disinhibition, had a significant impact on their response behavior. Although both the DBQ and sensation seeking have been constantly reported to be linked with risky and aberrant driving behavior, we found that drivers with higher sensation seeking tended to respond to unexpected driving situations induced by vehicle cyberattacks in a less risky and potentially safer manner. This study incorporates not only human factors into the safety research of vehicle cybersecurity, but also builds direct connections between drivers’ risky driving style, which may come from their inherent risk-taking tendency, to response behavior to vehicle cyberattacks. 
    more » « less
  5. Hussain, Alefiya; Tarman, Thomas (Ed.)
    Researchers in experimental cybersecurity are increasingly sharing the code, data, and other artifacts associated with their studies. This trend is encouraged and rewarded by conferences and journals through practices such as artifact evaluation and badging. While these trends in sharing artifacts are promising, the cybersecurity community is still far from an ecosystem in which artifacts are FAIR: findable, accessible, interoperable, and reusable. The lack of established standards and best practices for sharing and reuse results in artifacts that are often difficult to find and reuse; in addition, the lack of community standards results in artifacts that may be incomplete and low-quality. In this paper we describe our experience in creating an online community hub, called SEARCCH, to promote the sharing and reuse of artifacts for cybersecurity research. Based on our experience, we offer lessons learned: issues that must be addressed to further promote FAIR principles in experimental cybersecurity. 
    more » « less