Abstract-There has been an exponential increase in the usage of the internet, particularly among students since the introduction of e-learning and Bring Your Own Device (BYO) initiatives into the education system. In New Zealand the percentage of the population using the internet is now 93.8% and this increase in internet usage has increased the risk of cybersecurity attacks This makes it necessary to provide awareness and education on cybersecurity to students who are potential targets for exploitation. However, to provide this awareness it is necessary to understand what their current knowledge on cybersecurity is which forms the basis of this paper.This paper presents the results of a survey conducted on internet usage and cybersecurity awareness among three age groups between 8 years and 21 years. A questionnaire consisting of various questions on internet usage and cybersecurity concepts was prepared. For this survey, we considered both computers (desktops & laptops) and mobile devices (tablets & smartphones). The results of the survey showed that cybersecurity awareness among the surveyed students was generally low with the lowest level in the 8-12-year age group. The students of 8-12 age group were able to answer only 19% of survey questions. Furthermore, most of the students were not familiar with common cybersecurity terms and did not demonstrate enough awareness of common threats such as phishing. The results further show that the majority of the students were not aware of cybersecurity tools for tablets and smartphones which are frequently used devices for BYOD. The key contribution of this paper is to emphasise the necessity to create cybersecurity awareness among students.
-The paper presents an integrated approach to incremental learning in autonomous systems, that includes both pattern recognition and feature selection.The approach utilizes evolving connectionist systems (ECoS) and is applied on on-line image and speech pattern Iearning and recognition tasks. The experiments show that ECoS are a suitable paradigm for building autonomous systems for learning and navigation in a new environment using both image and speech modalities.
For a security system built on symmetric-key cryptography algorithms, the substitution box (S-box) plays a crucial role to resist cryptanalysis. In this article, we incorporate quantum chaos and PWLCM chaotic map into a new method of S-box design. The secret key is transformed to generate a six tuple system parameter, which is involved in the generation process of chaotic sequences of two chaotic systems. The output of one chaotic system will disturb the parameters of another chaotic system in order to improve the complexity of encryption sequence. S-box is obtained by XOR operation of the output of two chaotic systems. Over the obtained 500 key-dependent S-boxes, we test the S-box cryptographical properties on bijection, nonlinearity, SAC, BIC, differential approximation probability, respectively. Performance comparison of proposed S-box with those chaos-based one in the literature has been made. The results show that the cryptographic characteristics of proposed S-box has met our design objectives and can be applied to data encryption, user authentication and system access control.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.