The enormous advancement of digital technology and the Internet usage have significantly improved our lives, but have threatened our security and privacy as well. Cyberattacks may have harmful long-term implications to individuals and organizations. High school students are accessible targets for various cybercrimes due to the lack of cybersecurity knowledge and cyber-safe practices. It is important that education about cybersecurity awareness and cyber hygiene practices must begin at a young age. Offering cybersecurity knowledge through interactive tutorials and game-based techniques may increase students' interest in this domain. To develop a security mindset and improve the perception and attitude towards cybersecurity, we created an interactive cybersecurity framework for high school students. Through this framework, we attempt to effectively educate students in cybersecurity through interactive animated visualization modules developed in Unity 3D engine, enabling learning of physical, software, and mathematical aspects of cybersecurity. Each topic in the visualization tool is explained in four stages including information, interaction, explanation, and assessment. Several surveys have been conducted to determine whether this framework enhances users' cognitive abilities.
more »
« less
An Introductory Visualization Aid for Cybersecurity Education
As technology keeps overgrowing, Internet surfing becomes more popular. As a consequence, users tend to use it for social media, shopping, banking, or any other online services in which they need to put their personal information. These online activities attract malicious computer users to apply cyberattack techniques to steal other user's data. The users become attack victims due to limited understanding of cyberattacks and safety practices. In this paper, we propose a framework development for interactive and engaging cybersecurity education. With the help of the framework, the users will be able to learn different types of cyberattacks and defenses along with the safe cybersecurity practices. We also discuss the current state of the framework and conclude the paper with a discussion on limitations and future work.
more »
« less
- Award ID(s):
- 1903419
- PAR ID:
- 10160585
- Date Published:
- Journal Name:
- 15th International Conference on Frontiers in Education: Computer Science and Computer Engineering, (FECS 19)
- Page Range / eLocation ID:
- 10-15
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Cybersecurity is a complex problem. To study the complexity underneath the system and forecast possible future cyber events, we used system dynamics (SD)modeling and simulation.Network operations are normally modeled and simulated using the discrete-event simulation (DES) techniques. Since the primary focus of the DES modeling is packet traffic, the cyberattacks and resulting defenses are viewed from the layer 3 (network layer) of the open system interconnection (OSI) model. This does not discover more harmful attacks that might occur at higher(layer 4 and above) OSI layers. There are 32 million small businesses across the United States and 81 percent of them do not have cybersecurity personnel. Today’s extraordinary (COVID-19) situation, application layer (layer 7) security is the key concern for everyone, because every business revenue is heavily dependent on online/always-on presence. Research shows that almost 70 percent of successful cyber attacks are happening at the application layer. This paper presents a new integrated SD modeling framework for the application layer security to help small businesses from cyberattacks.more » « less
-
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of technology leaders in K-12 settings. Data collected from 23 district websites and from interviews with 12 district technology leaders were analyzed. Top security practices included cloud-based technologies, segregated network/V-LAN, two-factor authentication, limiting access, and use of Clever or Class Link. Top challenges included keeping users informed, lack of buy-in from staff and decision-makers, lack of expertise to implement modern best practices, and cost of resources. Top concerns included possible cyberattacks, leaked student data, and lack of user awareness. Finally, their wish list included technology personnel, access to Clever of Class Link, external system diagnostic checks, professional development for staff, and replacing aging infrastructure. The findings have implications for K-12 administrators, technology leaders, and teachers.more » « less
-
Vehicle cybersecurity is a serious concern, as modern vehicles are vulnerable to cyberattacks. How drivers respond to situations induced by vehicle cyberattacks is safety critical. This paper sought to understand the effect of human drivers’ risky driving style on response behavior to unexpected vehicle cyberattacks. A driving simulator study was conducted wherein 32 participants experienced a series of simulated drives in which unexpected events caused by vehicle cyberattacks were presented. Participants’ response behavior was assessed by their change in velocity after the cybersecurity events occurred, their post-event acceleration, as well as time to first reaction. Risky driving style was portrayed by scores on the Driver Behavior Questionnaire (DBQ) and the Brief Sensation Seeking Scale (BSSS). Half of the participants also received training regarding vehicle cybersecurity before the experiment. Results suggest that when encountering certain cyberattack-induced unexpected events, whether one received training, driving scenario, participants’ gender, DBQ-Violation scores, together with their sensation seeking measured by disinhibition, had a significant impact on their response behavior. Although both the DBQ and sensation seeking have been constantly reported to be linked with risky and aberrant driving behavior, we found that drivers with higher sensation seeking tended to respond to unexpected driving situations induced by vehicle cyberattacks in a less risky and potentially safer manner. This study incorporates not only human factors into the safety research of vehicle cybersecurity, but also builds direct connections between drivers’ risky driving style, which may come from their inherent risk-taking tendency, to response behavior to vehicle cyberattacks.more » « less
-
CYBERSECURITY AND LOCAL GOVERNMENT Learn to secure your local government’s networks with this one-of-a-kind resource In Cybersecurity and Local Government, a distinguished team of researchers delivers an insightful exploration of cybersecurity at the level of local government. The book makes a compelling argument that every local government official, elected or otherwise, must be reasonably knowledgeable about cybersecurity concepts and provide appropriate support for it within their governments. It also lays out a straightforward roadmap to achieving those objectives, from an overview of cybersecurity definitions to descriptions of the most common security challenges faced by local governments. The accomplished authors specifically address the recent surge in ransomware attacks and how they might affect local governments, along with advice as to how to avoid and respond to these threats. They also discuss the cybersecurity law, cybersecurity policies that local government should adopt, the future of cybersecurity, challenges posed by Internet of Things, and much more. Throughout, the authors provide relevant field examples, case studies of actual local governments, and examples of policies to guide readers in their own application of the concepts discussed within. Cybersecurity and Local Government also offers: A thorough introduction to cybersecurity generally, including definitions of key cybersecurity terms and a high-level overview of the subject for non-technologists. A comprehensive exploration of critical information for local elected and top appointed officials, including the typical frequencies and types of cyberattacks. Practical discussions of the current state of local government cybersecurity, with a review of relevant literature from 2000 to 2021. In-depth examinations of operational cybersecurity policies, procedures and practices, with recommended best practices. Perfect for local elected and top appointed officials and staff as well as local citizens, Cybersecurity and Local Government will also earn a place in the libraries of those studying or working in local government with an interest in cybersecurity.more » « less
An official website of the United States government

