|
Showing 1 - 4 of
4 matches in All Departments
This book collects state-of-the-art curriculum development
considerations, training methods, techniques, and best practices,
as well as cybersecurity lab requirements and aspects to take into
account when setting up new labs, all based on hands-on experience
in teaching cybersecurity in higher education.In parallel with the
increasing number and impact of cyberattacks, there is a growing
demand for cybersecurity courses in higher education. More and more
educational institutions offer cybersecurity courses, which come
with unique and constantly evolving challenges not known in other
disciplines. For example, step-by-step guides may not work for some
of the students if the configuration of a computing environment is
not identical or similar enough to the one the workshop material is
based on, which can be a huge problem for blended and online
delivery modes. Using nested virtualization in a cloud
infrastructure might not be authentic for all kinds of exercises,
because some of its characteristics can be vastly different from an
enterprise network environment that would be the most important to
demonstrate to students. The availability of cybersecurity datasets
for training and educational purposes can be limited, and the
publicly available datasets might not suit a large share of
training materials, because they are often excessively documented,
but not only by authoritative websites, which render these
inappropriate for assignments and can be misleading for online
students following training workshops and looking for online
resources about datasets such as the Boss of the SOC (BOTS)
datasets. The constant changes of Kali Linux make it necessary to
regularly update training materials, because commands might not run
the same way they did a couple of months ago. The many challenges
of cybersecurity education are further complicated by the
continuous evolution of networking and cloud computing, hardware
and software, which shapes student expectations: what is acceptable
and respected today might be obsolete or even laughable tomorrow.
The Internet is making our daily lives as digital as possible, and
this new era is called the Internet of Everything (IoE). The key
force behind the rapid growth of the Internet is the technological
advancement of enterprises. The digital world we live in is
facilitated by these enterprises' advances and business
intelligence. These enterprises need to deal with gazillions of
bytes of data, and in today's age of General Data Protection
Regulation, enterprises are required to ensure privacy and security
of large-scale data collections. However, the increased
connectivity and devices used to facilitate IoE are continually
creating more room for cybercriminals to find vulnerabilities in
enterprise systems and flaws in their corporate governance.
Ensuring cybersecurity and corporate governance for enterprises
should not be an afterthought or present a huge challenge. In
recent times, the complex diversity of cyber-attacks has been
skyrocketing, and zero-day attacks, such as ransomware, botnet, and
telecommunication attacks, are happening more frequently than
before. New hacking strategies would easily bypass existing
enterprise security and governance platforms using advanced,
persistent threats. For example, in 2020, the Toll Group firm was
exploited by a new crypto-attack family for violating its data
privacy, where an advanced ransomware technique was launched to
exploit the corporation and request a huge figure of monetary
ransom. Even after applying rational governance hygiene,
cybersecurity configuration and software updates are often
overlooked when they are most needed to fight cyber-crime and
ensure data privacy. Therefore, the threat landscape in the context
of enterprises has become wider and far more challenging. There is
a clear need for collaborative work throughout the entire value
chain of this network. In this context, this book addresses the
cybersecurity and cooperate governance challenges associated with
enterprises, which will provide a bigger picture of the concepts,
intelligent techniques, practices, and open research directions in
this area. This book serves as a single source of reference for
acquiring the knowledge on the technology, process, and people
involved in next-generation privacy and security.
Ensuring cybersecurity for smart cities is crucial for a
sustainable cyber ecosystem. Given the undeniable complexity of
smart cities, fundamental issues such as device configurations and
software updates should be addressed when it is most needed to
fight cyber-crime and ensure data privacy. This book addresses the
cybersecurity challenges associated with smart cities, aiming to
provide a bigger picture of the concepts, intelligent techniques,
practices and research directions in this area. Furthermore, this
book serves as a single source of reference for acquiring knowledge
on the technology, processes and people involved in the
next-generation of cyber-smart cities.
This book will address the cyber security challenges associated
with edge computing, which will provide a bigger picture on the
concepts, techniques, applications, and open research directions in
this area. The book will serve as a single source of reference for
acquiring the knowledge on the technology, process and people
involved in the next generation computing and security. It will be
a valuable aid for researchers, higher level students and
professionals working in the area.
|
You may like...
Ab Wheel
R209
R149
Discovery Miles 1 490
Holy Fvck
Demi Lovato
CD
R435
Discovery Miles 4 350
|